ed9f4b5218df534660eee63959bad7de3cc5e977b5b6644e7c2d693f0333fba51756ae7c3072"}, 0x1020) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x204000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0xe, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="c00000000000000002010000ff0300006c0219ac763abe89a0819c297c96b4e9465cb508773c19db654549b22f1f022aa737e4243e379ce5d3678a4fa0aef52cdcee6f63587e53afa0195d30beb0658d2b263728fa257aa437c7bdc19188e5c786c59456f52e18bb3e0f7bcd7bd356de5348fa0e8aa89a6e8aa71ea9f9d2258683d16f5bc2b1e42c15002354f4f73a116ce7519f1587d38bb5636d008dd91f9b3888cb41d8d939abbb371a28aae6a12cec4047f6caea905e11381898d7bc000070000000000000001601000000000100991e01cfe51ddd933fb59ed0e73e5d72825a7749b60fa32365b9f026da13543f5c5ba2c2b01a5cabf747b9936b3801bffc3ce6620b55c192a2b164ad585d4f4991a91a3994106cac8a98fa99678b8e454a0f12438bc57344acf5205fad000000e0"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xdc2b215f00000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xe202000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:13 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x9bc4200000000000) 07:59:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000080)=0xffffffff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$rds(r2, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) 07:59:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x1100000000000000, &(0x7f0000000040)='$') 07:59:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000006000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xe71f000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xea03000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x1200000000000000, &(0x7f0000000040)='$') 07:59:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000008000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0xfc83}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000000080)="8f", 0x1}], 0x1}}, {{&(0x7f0000000140)=@generic={0x23, "74f42cce78dcad59156c96912340a3c3bc1f1f9641c031dbdbe35add3786af02387d492a1ae796ce307bb82119c59f542a2700f6dbadcae148a27ebc57d977aba73c9703d6cbd3cb8bfa14d2788061ea31292d72ae55780f2d8853753262b005b323411724a479c2c846a33fe23ec5481e30fef90d07780411b056ad0d6e"}, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)="407cd523a8bb3c413fc1abc11ffb87b64ca830eb5e97ef52d95b0ec5af1727d3a9c47236555c147896aaa0d1e6f8f280ae42ef295f1aa0034fa57a56f96bf32647792d44165ff0f25b9fc860a19eda364e3758e9b86e408fbbd5b0b079861d745a922fe31840ff2d9ddab1d4193ffd74de36d1043be7316db1"}, {&(0x7f00000004c0)="eac670b9331b2b193aeb2ccc801d541da8d7db2c10bab3e355bf8abd5cd0e03799cfb2a3fe5333a67ae5026494ab046e1ed5864b0b9f4f9675348ff182cc2f5445bf0bd038fb404e0e478114843c9a93ddf0ff9bfef2cbb5880258d00d0fb8eb63f15b309f42a6722ea222e9f965e2347b9a0b3e0ae7cc81d11498aa3e353ec18b274c50bd351c48f52d32a634d45a95c421253cfa505e03e3e10ce622a7d552b053b95b60b444e4f8591f4f5375c4793f36f84015122c1ae7c94553432227bd401fcd6452823311692dbbe6"}, {&(0x7f0000000240)="6a78e8473d2675f312b5ab53988c85da5fc80d47bb916e7dd595480db01ce047c7210e762b9f78ea9c390ea774a1030f557bf728ae56b99503fd6059621e76fb116306fee7182aa92c27a4178e69698cecf75c7faa8dc91bf18983d6dd1c7cc84e582e9f7a25bec18745960ccc97a6d1311afe194368af64fd71dfe935251f458147de2934d64f79"}, {&(0x7f00000005c0)="5605d78dfcb808d11cce13daa024cbf498eaf44db37ca78210f2715f73824d12fcff208015e56cf9e33659f27e9ab24ccdbac403d593ecb228432c6bfffd9198aceffd0d4c063c00b92912c6242a8fddf6df5fa208bf84d9802c09b52d531281ac9481b525ca2d62781065b98ceee32d6d853581e770db701ec67259fa37231a8469f3f1bddd1d8c6287bafb999ccef1ec935a3746fa5a4fc49363c25adb6c849ae60b2ba6f6df49e120ef12ae3ff84d863d1e41d5f64d6e77d6f046e3f51d9e63a90898ccf57d562d4660456fbf8c1796732e32ca2d8bd193cee2e6b2d460c91392b3cc2d41d575a3f90d55a2d9c7"}, {&(0x7f0000000840)="a6497beb711773f87a39b4a0e4a34d9a69b7eb3047b8975d4f0169b3f047bbd7232baaa58fe4fe2c89c7bef5e456b2f5bbd5854c4c5a250f45a506ee67507791ab24ee34bbf245efd6a888f4cf423e5086f4581a52f882603e6db90e4512ad302b97a129f63c9bb71cde7bac2ce7ae03ee188d6cb1df0a1f6fb0275cf5346aa6fa64e9a16438a083f8313a5d027bd8abba7443729728c1dcfb8ea1f06555c0b83e4e8681ff43c95dd818"}], 0x0, &(0x7f0000004300)=ANY=[@ANYBLOB="000000000000000018010000910c0000a653348cd3ee5cd0a4e52dd889f7321b2d96093ea0ca5f46fe15151bd3ca5824574d22d984e6d3900245ddc49453bb5458246bdfb023f80891923ad28c243d5fbb481d6d792f72fb944f504ba04272f7f1dbe86fba64aeb69ff7e299c6cab2103cb2003e066b1065c84f36469fb087f92e905807d62540af18a2010e8f8cf6a5b84778bb33cf728323dd7bebd44bce062c4b84731c0e387c560933d536ad9f3ba5fad3b878636fcc0900000000000000030100000300000046a1000000000000000000000000000015010000050000007c7fe232756ef2338b27104a569a486ffa7577cbedaad0359daf8f073025bf6bee47fb8c32891145bdc58a54c382b96cdc23fc438d5a73ba38b243ef0dd0cd41b4da75fbb8d4e12055a4819bd147a6e8eeb0bf0a10c476c3d54b47b6da8534e24623525b7b67a64277d8906e20d1404b4e4e55f0261658720a5a3e02ece1fe66f0e7973a28cdb854855a19f27398316b90542137ea296facd9a683acec655a6fb61095055a5064e80e04dc5a45a5648c00f6f7b9baa8ef7b04580adda37394dc7172a87918108b4de79c9fc4f8531fe5e2a170e0f491481ec358b467c721a7cdb1e653db8a9e2152e11a5bfcbd5890d97c5b196c611cb9723bb068cddf8ef940947651b1e79c53ba8c77d6eee18f15d1172185d199c6e584deb015440548df3745a3fe6b9b2fe820bc9107aa5a28a81faa5b010ad1453642705567b34bff1e7089ba9ea870750977a85040b0a0eddaecb06502d1f1ec3f871ab98e23000ae829e11feb1d0d8b9c227d498fba4e024710ded5c543c0d0275f80c65f126e649a9d23674cd26e01ef67ad3ae4354f008d23ae988dea6fb4a0a6b056fffe383921299eac82b74028ca390c1fa598c2083924c7da68e22833d44abb9e0621380a3ab748544f1b24995812730cea9d177600b919d12df197858abbc0e230ee1444f46157d9924cc8634badcc79f7ab4960e7717fc12306dcc9a48c6347e3aa3303f741617689a9c469f2dfb3ebc90bceed1e8636392e992aa3d0222c109bb46acd64609f1e4dd1560de2f4bd5b061f78da7e8dd68049f83f53a74b908807a7a3d75501cf62ccd5086d5dbb0098a511ae5e0acd0345bde54a3547acc849e6759f62bf566c93977840e420caae2a03e4bd4879e29f58ebd9c7ddc13ad10d51c0df0d6e3557d961f8ccd215e5240a1a229527d176c020abda2de2bc2719f129f2061c4141fe249446bf50d4f64a32f1d046c63410da5eb6927bb7eb9f8553d6801ef6ea7f471a36e34ace764c234b0d27f3785589059d4575327c0c636db20fd67f16ddf1a0b10c56be4fda1015d9d5a48746af85b678117d75381024544f25e410a3d09e8215c67d5640b1b29040a129509790f837582f4352b4e4f637bec86d7e63ca90f8deb347aab5f0b8beccd4930889b2460110fe42629e2ba64c71c2cd401fa82f732a5cd39760a68966ec84c4ff34b0d25ce8ce2ef2c2df986b696584a0a89e9f4454f7a4829df0d4239f38c705b433d778f164313e2569ff7ac46f092c9d80bf859dc38608affe7dccd8b7ace8872d199058e4333d0315863a8cbe6622b3985a315fc91b4f3659647859a1c9e0e009f2a600f68633fed8efb0d955f1da2ff0162fc67bc31e18d969e9140d24836607c9540d5ef7b4712ef712825e7b8b8e1579f05270b47721e4ba9d52e75fd70c3a8b892e9b7b0a5ff58a6614d8f5f0a9704e31383052a53f711c44fae8e8ec4ac89879eaf8eeb12a8b6c519762d9338b4ed94c867453ddaac65703215be0e37f1ce46126d04bcd3470b19befbbe9d7fcea0a20945cc7a6ad4cf71f441c0c2e279028f09730389d3bec0ad04997b8c7f6751248e6929397e5a1928335743472be2ed4d973ee214753c01ce4be54a2946a15d3f5c6c2ba3e211a265a81e3e7e4ab2a573fce9602daaffb8f06d37f5b833e89fc7c5d2eeca09abf161ee09d6cc42d819ca0ee45135196e222ae5ecf412ba03775853e78366b53c88719b3bd133a54118f6e1b9f42a1e052ab773bd4ed32f19b5ea3b5052bcaca5753022da5f3a35c05d69a9b2c9d963349feacc644ed7b194e38b01e755accdf5540bc57e51ebc25b94aace8caab0991dff7701a7a07ded7c90fb3afcd42bd2876aeb85fbe55528914547792fca6d0ea0e340a13f8daf7c070bd956d7c8e9aa745868b709442308781a1823212d2ffb6d1a04645282db0ffc5123db71587784eee7d4a7172e74f58eead6a772ae4477cdbd9504ca2f3973d4e26b38dba98d6380b7fe8b9525c2b47b017e3f408245969c767981d4f24068cdb9e829ca22d638038617c8b977f8f3311e6e54a8c21ae7f332b8084643d1563ccc5f19793c8b1416a06c1e626d4f55f77b067e96fb75cd452434c88bdeab1ba13972c32a1a7f2a05d1f842fe7bd755f0a2cb787e8432fdf5091dfc093c7a73cb7363563b77bd3f098c2574e9025ce850bf539a7a4a859a4ce05191249c04dac3be91027ace9c3e3fbc90b7e3efd6de5a11d1d11a681b3eb1f893017db4ae4670204a6e74674c8b5a5ac86f272d0e7314cfaeb31e987ed9031ab9b636585eca0d6b3d9b284b71271d3159a2f2d157778973efc35a6c6b204ba4014ac4ba5739e313b34decb088f0ed4dffbac2c8573b421af4d83d887cd47eaa66fa3a22a591551d1ac3fbbaed2a560e7abb5297d4b96b4cc36b3d53f694f8a08aa13435f76044559cc78de24065012b660f4b8d7fb4338a538dfb9db1b715d4ec51688bb3f0b326d762aa4add877fbadc4306fa195db115366c3347b56ed2f64f2038a6afcfe5c878ae67389deeef66e717c2d57f528d857257b770812b6124621278fbcc506fb9033b2dd10fb212ce7b9d72583145f3caa04af6a4ec9168e7205e06b71ef094444d3223d704b0a3e22b6d60a7ea7e93d9da0d384dda712b35172cbe0eeea356afd19608bb56643d0ee03808121aaa5ea839ca45e8e49f268443014360ced41884aeeca7764ef28b2739fd3019e2f87f2a8cd30859cf39d42def2f3872346e471b71dc912722f12cd751703e6d3b1dbb7d403be12bb65a446a72cd4e2da7d11a9f2834b3a4e8e58cdd57a1dfb92b764b2b0d1f65c25a0e229630202e84f144a6aeb32f377901327f146081772b302ef2216617e4ffd17a0de94ca1354762d717a94ef09f098fc8f4eabef8a83199e0ee442d216082208111976f2d6b943bbc1eec9eeb84328497dbdd42c47fc851b3db6637aa3693ae54e65787077c1d73d27f769dca6565cee273612a1ed9ee1d0fa35fccbbc666c509c9c1ee3499db2bb5e207300574f58cd3fd40b9f03f0ae73f52ba3a4be09e45a3448ea004c41cfcee68ffbaa488d227244bc74c26f12a3f28e5ea55c954c2b500fb1e38a7b1ee605318c999014a54e51984ac9d064c46e5593de5de80650ff0260be69d87d88d273878e90878875242d38bae0d75ae95a531450a6272a11ec524998e181c6c36e31e9a0e68f9dffeb3474c1240f2f885b0336fab76f0a7b44d7fdce60eaaa41cbc954c1ce561d2d21a278878a49f491a00ce23db047c5495ae88797f9bf33e9f91ee467b1bab03a0e721bc8796babadb586f36727a8a8935e9aa6cb82eab5023b904eaa2d8d1e5142b2e0fb29a8e01857b24f7a5d2c1021ad491e8b28162c589bdf2d81c0e33e45445a460b0e9a11a192da93b546ee785f610fe086f5322fbfb6b56f865f5582ce0406861c02c126cf552e0a9093aa1596563901b7c1552ee001ac37d232c8990598368e3167b995fac5d043ce2c6c14f24c6004eabd95b053aea4c090f8be74bbb742d34fc2e95a9e33785e0b2b35e517bf16967ceaf50d67d79bdb5f3f719f8e011504bc38b58364f2f523926e17153af2897653b4189653ce4075ed1781817daa57a573e563d17ef3a68028c58c68d992c5e820b45e2bce0eb1b6d4c1fb8113d7b2b55c1217bac6a15ed09539a816d6daf09b7ecb7b54fac200f1df991a1f38a7868bedd39a5d68052bb2650bacdc1b68e29175c53dfc5646c82de36a671ca91e3c98ca7bb39946f6a9c46f53d6eb614e5573bdfde554545c54c95ca4fe32a0a8deccb5b33d2fb4daf36cd20002bfbdb3536bfe8d7983fd0d7d25736c390171857e6f1358aef40fb1fbe2349dee2f065634d2ac14b15747b523f0b7cf83bb6dbf8c35108ac0865fc6a4cf6434b6c75916eb8bbe500e2a296d19075ab573c2088903d20b3f5907b15965fa81bbd4bdcade10c7e847b3d3696a2481bd2283bc638c8ad3402319dc05a8621fd2d61ed2807f0b150e4b62eca3f17b3511b04e028d07cb7fc9f70f48862123025cfceb0d6e65214a97ddd9da28f78bfeb724d7a7020a4fb2c08dfa03b0fe10fba94ea496640fa554ebd77edc293259ed80bb29d9febee16a1bbeb9ce9c632905dd2b2fb07691a6d49289ae9c9364db1176290311f9d3691ded28a9930adb50bbf0054c92903a4faa4e9f68406a45299e99601f53016f944f95a76e91dab05cf783a07d5bafbba309972a850790eede7ca317dc3473609d3fe1472652ea2248d936a647e31d7ca0132b42b97f3c15362b2fb9b684cc609c088d8077de805878aa9b04cb0a19418aba94616d3a095e90372d4a55d956016d412fa1dcad9939aef3ae29377509c4917591d5d46c8baa69f217914ada8ac3535bd7f8a6011f1c508660469665c1a39d486abf05761f22fd8241cd9c790e836add834c603dcd1e1b1d6cce3912998c81a267d8244ed2f074e6122bd02141bbb5183a4fa9fccfd0b382b20c23026cc4a7011f79ea88dd4e1afdc7d9ad4288294602e7a943743ef135704b1e3fd9ecea6fe7e9687ca4550acc2f550b25843a17c63d7ee8fcd14695f78ea9453c3abce4000914d2a3c4d8a3dd4062ebbd267aec536d844ac4cbfe39b34dcf79033d82c8d45a3dc79c7aae3eeba57e35d8e88cfb4855c668716e5a3082082c317973371fcc9a96070374ecfd7eec17d5063c9097b09e1343557ceb0441c4d51c795c308ad41a56e0f82462bd2a65c232e5a43496f9a1ff515b34332f7acd26cd58a4f0764f11abe623d06e3924aa3cd4099eefc476a887c3c7b6cf841d7f3e158b66581e4b52253720caa8f1a0d840f08a9d9e2460c1c681b52af7340f46bc31fd51a14cd1c3649c3b4dee4b05c433010eb109374371f92fc170a9005077fab2e61ba8a974dde0c0846c6ccaefed9522c642e43b9d2f75e36c2ca34e05767ef9a18994df6bb115fdc42603a083784ad31f3bf99d4f1cc7cea1402801a9bb6b919b34b820c1e5f633e75730d94b2976d38bfc11ebe6c282e65aa655fef9dcaacac86923dba597f52ea9dcb384ce1b684b857ae2cc6e61410499de2549f5028c9430b6f833a148c9984ae56bc981e4dcb250ecbdcdcab5617c32e246ab96610b0a150220d5a925e4b9d09849695aa987dd5124048c7edc9122c5a329e7e4c0af07df23df7a7f0a09f5fdd01460bc4aca94efe168c5607af401e5b90356e44e02776594612f99f1979aed40d4602726d8070b8714f4a7a8bb0b9e5b693fd2660ac966d055a780ae30fea5e093a7829245962cf59f1387f72a41fe518a87e75cbbcf3460ce65de040899313f1c173417a14e1be24549f8a501bef994f6b62235856dd58bffa09f6f95b1567e8e43ff709418d4245dfe23a88f3aa82649664a9648b6ac77e781d3cf2aff8bafb1222e4fe7cf4f0280e918247ff100ef72ab127861a586425fe3d58333e5c97181038957ed49bbaba24ba126938e64481f1f16505edff0d3b59127087cfdf7e12032501496e3f2a1fe692a708d56272bc8cb7286db00508944d02714e49597b1a1a8d3fb95b6446fba9018934e5f72e9d45525916643f01f6c3ce0b65aec2648762dbba780e71c9a2a5bd09942f2ce21704f2d4ef330abfcfd6305538fdfdb0c958eea0e3b14685695cb500872f7b47565b026c1a7d0fd8513ea66ac2f4a0ba6432b5f284c466cd3842e27a485bdc429742b5ef0499f9fbc2f160d5c423c0be8e0fb7a5636941fdfc34311989e5722007edfbaf9237b347dcdd1dc046913a614f03853e0b90e00000000000000002900000000000000feb698ac488959e4e2eb9b2d214417038ff5235c4b81e07fe0afff9d52d526f1722abff5e9897d73cb633198597b00000000000000000000080100008000000053aaefd7a44de01a0efbdf5f4c167da4001f9f3732dbaf96e7dbd2607b3355b33269187d73bdfa96aa5f90c66c3ca35cd8e22c9845deb256390144b730adec37f242338ccf6cf30c8ec7b296ea3d6fd480b552138a188bcbf8b52b4555b0897c409775548204f3794e99161a3747d014d659fd70c8c8d521faf15597b2654b74645aae14030ffd2879629fb1dacd021e1fbe3f73fe99899c5236f85427b3b0d7bfc968e0987428b262851f9d64748644f142964438b5a80171ff904f70d39055c806456865319bd8950eafee6ec6f69189b9e2e5d7484532ce39fa636b9f2eda919deb1bd90ebab22ba8ca210ce0207f1e954fa953b435729a530ebeadda72ee0cc1d201a12ffa6c019142d061c383926c7ea97a87556f0e69f6cb2f61cc0096c880119f26a486c20f498058a2db172b37654fe2eef4c084ee98a84c710f8845826b7090e165fdc8a697e1348ae63f143f6e3f2b6df09f442125aba538e8a699440e0b7a3f53e3fe52d3b57ccf9a80b091242c0d0524acc775e34f5b8af2d8e8a824b970599d1efbb3603446b61fa12b2bbe46d45c793cb9cffa49bb4c0528d3b761b00e956ee8b7ea4566a3512517b62b4ea843ed2d0212c09d9a87f3f93fd64c633a4bb99e65cfc319cf8dd584bef701f751510fa85cfb00e2551bc1f3f41d360e76a60e4c74a42317d899209bb53b37d3d9f703b9093508623ce900d0233218bded71a9d294ef6bbdcf423b7aab4ef275d4791592674d4cbaa03a62144834da2016d5a9850b08bbb27f241343b89bc4e9c529a2b59aaa1f5aca61d7838a17c8893a75d4611e7f79d72126c03c72badddce7562503d04655ca81bd36498393be2f46e4784d0aae3f0184f7bbb68ca7b9e3453d55eee9cbd9243431b0244db31aaaa19fca00ba572606a9bc972e4eb0cbd4bdfe4e0bf358fdf71765f3a356936d5f4b15415086cb80829033f8bbd9a98809753b262039e06c158bbc54daa1584da1a32a48e1a750abd7b8d1cfc30e163049d302148fbf60c019b082f320f82251b00c54610cd0d65da09430e9c41213dc7582753f98e8c6da1b6c004dd07375049fb4726b2b6b6cbb27ffa05e87141474af01262752d406eefc0d3f16ccd0745538dd39aab16bfd5cfca90e0158a6d1eebc06ee1deeb7da42b516ebc3411e4a38b0049e375c67c552ea7bd741f702a8ac18328e2a09d3b9d38896ce00322b7f7bafde88851f70d1d7989be281b9dbef1267aacd39e85c74a40a31e6c4bb4c5427cb826be2dcb1f9145a7cd60cc7508518698c90948b84a9efcf521bcb2073d01c3b659e644bd499f0de2ca24c32b89602ad8ab805e194a8f12c27c91c9f551db79484b48e091f8cb422925a56d58b337d79aea94ff5a81d34fb3242c3a7acb63beaba2c9f328a73c0f55f67a1954b23e1978568ce9dc5a0d0a75be0351298c9758d8317e3274fd20c41bfbd2565869ec3ace2a1a06e3e2c0955aff3999e5e6078aefabac48d21971fbe8ae2c4d5c3d26ca68aede207ac6bdfb1176a02f576dcdf6462153a9292dbf11b4f3687797d551e12a7085841926f278fd37ca765291b659a89dc60bff83f77a2cbd249ac811df55028f41bed6dbc8c78d3fdf7c9eeb510283c535245f01727242f442a7d57103eecf425217d86d053debc545996de190e53df60f1b30afe8110f512583eda50ac03918ba134922964719c62ebcfc676c648910206108fd3a97524e37fa8460f01fdd1daa378d5f8b0e853427fa388a5dd1f1978a9094cce23deb7ca701158788bf8e90838928a886bd85a520bf829b9822cadc6b85469462261da549b0ebb20d3eac8a9381d08bbe897fd1397c6bed33f67d72b8247bfe903c1267eb7a7b48faa4cb00e4a83ede1b0d0407d02bcf8148278faebf9b2dd090c73e1002e1409535162daa2ad22586df65d1b9d06faee81f4d2851334c4ad4d97272f3204bc799eca67c0b12e35c5e63b84e2e29e1920d656d389d3a586eac9b83586d4569d9adc7116165a410a1f33cd3d0ff38648c890c0438b2c828842d9bacfb5fd4b5c3f8b3141e20969c46cde8617dff54583bd56008b8c17aa11056ac100541d1bc6bfd8de7016cbeb638534deda5ce99ecbfc6dda8368b4b65471e9532dbf600acf29a10f6aafad042eb23c9e75f983eae4e275b3f1964d540c2c7b66977aa785c48f2b660de5b3a84dfd5a72492af7f3f12c72b4579f57b357a9bcdd7af153e822fa3b4dee1026202b64f4e53504e926645ef07964794f41d5f7aed60f38e2124ee0d9ac07e1c989bf52adb168541712c7de7ee0d57abdcafcf565aeb51a40038d99b22ed774258172f0b6a2461bc9d0631df24cc421843e4fcce5a5c567a6b762eb8d7de0c06bda52f2ca7bd0a089c9cd797a41d42b51edd4e5104e1d74966d039de6a3674ce36d14f86a688e4c5d627577a525bb1e43c86203e48152e928a2c6a1b2a6297fa80417ce92e294fe4be60a7bcf001bc36810db7bad580e1f8666f6dc3b5acfa88a313d24c5c70f8118f7e9e937f4eecba0610f2c344d938852c1c5358e79457c3881e63590ec02f966764b3a5574f80fecc43720a7d0962daa9f39002d6f863142cf88505aa431bd70f770c8d75a6667ba306dfa88d29dff74fb7edce9e8636db1e1cc5d6287316244db3c0763065ace9a1ef206750f8bbcef26cee7b169a97fb2dad2b8ddfcabc8b207c161d9190503f76d415cf478c8c4d27185f2c83efcd36b082b317db6e6426a63af776e0678cbb91eb75cfe3e5dd1cf9dd320cbdc1b77d8734641db6e69bb7b915b8592b8287a80a81b618f9298c0501adc13410ce56d4c788e493e6863348842c29df8852ffd242eefe187c7696955e881e6ede617760573300e49eb6801a6ce2e869d7ee5fb2a127416de947d0dcd7536741a79d7f83565ceedb34b2c89cdd57e1b3619055c264a8751f791401f152c362319c58bc3fa31496cff822c7fcb769ca7dab1d83be8964171a3876391c7402011d74209146be8e3aa98fdcc20ea59ddf490da7fb0c1be0d47c3fa02d8e8086a676e70ec0d76e71b4c79bf3a83b0e152409c090800320a848f9658eefeb1d401fcaec7292c2422d235412a7cb2ea37cf756c2db84c1540ffda078deec955b843892476e741547971650d669274e3967c5201a156d841d569abf09189a9be082a0eb3692c4efcf398d204d5ad6190b337cf5f062e6aab9c4573ee04d009eceb2e501bd8459bd77621b95c5867f2322362fb27c2116863da58415d665fff6ea96c152904cac9693f0bdf7f6de1db6f42eddc9ad6971ac19768b26e0634552b947730c15f99ae613e1919338c8f8b061fa805243488f4d4d6cbf7c50da1b2e6c252d701a95a626c25bb0639b3087c89b0295806c60daa757a1517f72c861ee1af8e6c6dd557b832a8f49e34c6f3684e3442bfdc6680d8d1ae08c21d0fece422eae180b0233b4bd0bb5bde33c7165ef6219dd856152ee35c911c5a08de2af1ae6913b95dcf9a692ee29e626139f032a491c0a68f7e45825f477fe6749923829ab17d2dbbaa2009b3148d47a89b5a3bb080690427b86d24bb3e508d4acd9a80d216a6ff0d5cda9a72d7cdc229d4473a6d9b629d5693a3ffba8fd21ff8ba29369006442dd84239eadca91b34afc622db90ca2ffecd527f4b7184a19b71172d31f54c562fe88043e4924fe0a71ad23abc97ee326fb6f15cbddc5020a0e19df5e574870596eb3cab8e6704e514e22d0e48811548ef56e7a58575e13c9a9bb7c0d5f2c02544d2ddbf420f4368c96224b553f460cbc58673317e02b9f9eb2f75e6099485575c8468297a281b1b0744498fb85abe91bb31895e23e1112dff659759de9e1632741b602999cc403cb558d5ff144a8b5ea394dd805b283b2a615c6311d83b0ef92e167c8bbb6a7a94f8a5af1cd363edf21a37c4aa531438a323a0969a0b10b17c18cb51e591468e7492b7c68085b8a28b122dc6a9f0db71b1d550189d9df3b02586133ed4f8782bf5df868b2e0dcd0d5845ce2e1b7bbf45540bc63870e0e3bbd8e268faa07c3f0a56a5711f78bee52d1bb53517eaef81d7c3cfacebdc26a7c63e4d48fb8d3434fe0a7df949902808d6832d58fda40e68c045427b412c7df2ed2a72f420b00ec481c0bb077c933018df9cc01b6af780d978f5d7cf9779e0e86c918d241f2192bc1cd32c78bf01ec283c8a7c910d5cfd51f412e015e6fc767aac9693658ceccb499d1867b26e14e28fc86f383b280a9f14e15733e1def4e0c4d9f7cb79eb96b2031cda5e284fcb600c7ecdd69496555d6a723db10891933ebd446ea33e72107a0f6f16d6eab6f5902cad8ad32df935412363e87d70e2b72eefcc5be9e2c72fd7d279d3130e404b422eb457b40558c1343ff8116a78a90dc9bf4b3a14efef38ce8f4d8cfca7207421614dbfff9bd51e5bba8f97a1720ba04bd58c2d291210b15cc74f9aeda3f32549c20a6395e0ecfb47c3071d02372280212e4c045b6f92e781b784f5f5089d1cbd4721ebf8c4736c2293651c32d235ae897c6e0e85405e4e8ad0ba2010a90a5411cf1bdc477f81dcfee3ddbdb4c96da475742ed376b83c9bc3013608f40e242e7d8bc39cec7a0a1161ad8637b31f734406a2b40c4116fa6a1ae27caaba579632e840909e7d3eab69986cfd080ad30e5960e564da523ebe117e78857a81fa984aedfd4f00a02d9d96f28c3c6f7c6e449493a75f22a533569301815f18405270f702b94d70efc663235813fcda30762019865028e26e3191142bafd3f1b719947d71b7b26571d89a424c0732702c93422b84d3de668a51806665e92f224f67f29158ed609f5aefbc008cce7825eb06419019fae79176d3b5e47473b9e7a48d662f4d2e8692d38a8a0da7c70c90bb2d797e0078200354f365f0ab2cea0a8d514bf494b69824449c2b4ed0629489ccfb8630fcd70d6824430cb611fced5ab6fd5a95ad4cf75b2b745d4a0483477983363aa1206ab635900d2b18d6e26d413e30b2a35ce63e7427ab0d7b4492d8537a51d1771a55d11dc39d603e26b53f2a80c9d5fb819d70e16b609abb63728a658f67f60fc49a93e2652c1969df8fa4a421eb8226235c16985dce3ef6a8e3d993fa1e4650bcdbb118e9da5d152774ed5b0380428025041eff770586ee7e9eec85f949acd33ab62555a4e4e81551bc1d095be388d358315db1938486c289c8d2ac92321f208024494981211f93d305a28b342c5184bfcd519c97cf95ea246c85235f4d9b30ee98689a82c2c2599df4540937dca29adf4e37209e2911c0ab3bc48b7d98f296c920e3c137544d871520fc812dbf21cff3063ba349103e547a181aef91d87e7bc4fa5153cbbe5cdf0288793c822153f8e94156aefa04794eac3bfe9f1474de3b1fcaf4c4b586fa984cfeb3e9fd84a5e2463531199c45795e210372f3f4ed6e4a70b070e79aa7fb5ebd997b7f74b495749b87377f5d6f3d7a1665c658c3942f89c9d86857ae583858d9258d93eb90512f914c7a2f579444f681247cf72f11d9a3658ade703d3516046603186d7f92939ad08ab6c582427adaa18e2b9a789f781c7ab75403e5ea188844e9e113fe032921dacd943910e44577a6d0e0d2025445d8d4e7afbfcd28e3c099f85d3c3cf4cb0ce7a0feda731c050f60cf65819c7a07266dbdb4c2711f9077aada5d14f370294b8429bf3eb0f355da568e45e8876f503ac9da98b277fff5b2c733ffbe7cf807cba94b8c24dd56cc04a60f18346afb9f53700a45aaa15ff4247b96468cf15f6872f2b7ef3861e0388b6f084d9002bcd47debb17807e4bc086b84636a3eccb8d36aabc14efdc1040d5b40d66b4ad0d8f07a76f169a8d576a15735646d1bf19bab5a6a46324c86fbc69c789150b2d124e0c16b1d7cdb324453e6fd8be67e146dfa6ceb942be35345d46bdcf2e727c4531662"]}}], 0x2, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x408000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000006c0), 0xfffffffffffffffd) sendto$inet(r0, &(0x7f00000012c0)="dd5e97447f1f65", 0x7, 0x4c1d0000, 0x0, 0x0) 07:59:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800ffff8000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:14 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x9c0f000000000000) 07:59:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xf6ffffff00000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x2000000000000000, &(0x7f0000000040)='$') 07:59:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000a000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xfdffffff00000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000001000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x2010000000000000, &(0x7f0000000040)='$') 07:59:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xfe00000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x2500000000000000, &(0x7f0000000040)='$') 07:59:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000002000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = getpid() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r5, 0x0) sendmsg$netlink(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x56, 0x7d, 0x1, {{0x0, 0x3b, 0x6, 0xff, {0x81, 0x0, 0x7}, 0x4080000, 0x30, 0x301d, 0x7, 0x2, '#:', 0x1, '\xf8', 0x0, '', 0x5, '+%!)&'}, 0x6, ')\\%@+!', r1, r5, r7}}, 0x56) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000003000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:15 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x9effffff00000000) 07:59:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xfeff000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x4800000000000000, &(0x7f0000000040)='$') 07:59:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xfeffffff00000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x4c00000000000000, &(0x7f0000000040)='$') 07:59:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xff00000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000004000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xff03000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="651d011b076770816a40821fe49776c81930f47e3241a71eceb145b3dfcf1ee9e0fecfb5c3f5e995470a726e9f71431646310608fe77625d58d7fdfd", 0x3c, 0x8131, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10) 07:59:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x5c00000000000000, &(0x7f0000000040)='$') 07:59:16 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xe111000000000000) 07:59:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000005000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xff0f000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'vlan1\x00', {0x2, 0x4e21, @multicast2}}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmmsg(r2, &(0x7f00000075c0), 0x0, 0x24048075) creat(&(0x7f0000000000)='./file0\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x6000000000000000, &(0x7f0000000040)='$') 07:59:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000006000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xffff000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x6800000000000000, &(0x7f0000000040)='$') 07:59:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x42200, 0x0) sendto$inet(r1, 0x0, 0x0, 0x840, &(0x7f0000e68000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmmsg(r2, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0xe80fc91a23b39add, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xffff0f0000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:17 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xefffffff00000000) 07:59:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000007000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x6c00000000000000, &(0x7f0000000040)='$') 07:59:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setrlimit(0xb, &(0x7f0000000000)={0x100000000, 0x100}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x8, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3c}}, r5}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f00000004c0), r5, 0x2}}, 0x18) r6 = dup(r3) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$AUDIT_GET(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3e8, 0x200, 0x70bd29, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000005) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="c00000000000000002010000ff0300006c0219ac763abe89a0819c297c96b4e9465cb508773c19db654549b22f1f022aa737e4243e379ce5d3678a4f0800f52cdcee6f63587e53afa0195d30beb0658d2b263728fa257aa400c7bdc19188e5c786c59456f52e18bb3e0f7bcd7bd356de5348fa0e8aa89a6e8aa71ea9f9d2258683d16f5bc2b1e42c15002354f4f73a116ce7519f1587d38bb5636d008dd91f9b3888cb41d8d939abbb371a28aae6a12d895a1b92815a167211381898d7bc000070000000000000001601000000000100991e01cfe51ddd933fb59ed0e73e5d72825a7749b60fa32365b9f026da13543f5c5ba2c2b01a5caff747b9936b3801bffc3ce6620b55c192a2b164ad585d4f4991a91a3994106cac8a98fa99678b8e454a0f12438bc57344acf5205fad000000e0dd6e9b879112729ecf7387d06c032213c2c977bf3c0c84c81aa41955778e5e033366caf7332ae5ca98"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xffffff7f00000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xffffffff00000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x7400000000000000, &(0x7f0000000040)='$') 07:59:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000008000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xffffffffffffff0f, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:18 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xf0ffffff00000000) 07:59:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x7a00000000000000, &(0x7f0000000040)='$') 07:59:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000009000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) ftruncate(r0, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="c00000000000000002010000ff0300006c0219ac763abe89a0819c297c96b4e9465cb508773c19db654549b22f1f022aa737e4243e379ce5d3678a4fa0aef52cdcee6f63587e53afa0195d30beb0658de5c786c59456f52e18bb3e0f7bcd7bd356de5348fa0e8aa89a6e8aa71ea9f9d2258683d16f5bc3b1e42c15002354f4f73a116ce7519f1587d38bb5636d008dd91f9b3888cb41d8d939abbb371a28aae6a12cec4047f6caea905e11381898d7bc000070000000000000001601000000000100991e01cfe51ddd933fb59ed0e73e5d72825a7749b60fa32365b9f026da13543f5c5ba2c2b01a5ce6620b55c192a2b164ad585d4f4991a91a3994106cac8a98fa99678b8e454a0f12438bc57344acf5205fad000000e00d56f341ea0ed9c3401868acb73ac7286812be859f048bf734e634c25e76653305d35083a4c0aa5975247be4bc153431f90f0f5246f529efadd70f0ada0f5b643126237c089db1141fcfd39cf18b7a2bb4f33ac96cee24f316a7acfc20f85d3ab4ccd8c41930598211fbdb0e0755464c07587be32d1ad4a45f1b4330fe76a99d26c6103616b6ddc488900391998115014897c1b505f7ff2eec1cfdff3cd7f47c0d9c351e5ba77e06d718d717177356af59646b7e2700"/475], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'wg1\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='%rans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000a000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000280)={0xfffffff7, 0x80000001, {0x0}, {r1}, 0x3, 0x6}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) clone3(&(0x7f0000000380)={0xc1a00, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x18}, &(0x7f0000000140)=""/206, 0xce, &(0x7f0000000240)=""/33, &(0x7f00000002c0)=[0x0, r2, r3], 0x3, {r5}}, 0x58) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000500)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445caf64cbfae21128d160578858a6259283c4958956ef02022cb28175e33b95", 0x49}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f00000004c0)="8fe08ad145ae84bf8122f0b2ec8cb86164c466", 0x13}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x8000000000000000, &(0x7f0000000040)='$') 07:59:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='/rans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\\rans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='t%ans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x8cffffff00000000, &(0x7f0000000040)='$') 07:59:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000b000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:19 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xfcffffff00000000) 07:59:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480), 0x10) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="c00000000000000002010000ff0300006c0219ac763abe89a0819c297c96b4e9465cb508773c19db654549b22f1f022aa737e4243e379ce5d3678a4fa0aef52cdcee6f63587e53afa0195d30beb0658d2b263728fa257aa437c7bdc19188e5c786c59456f52e18bb3e0f7bcd7bd356de5348fa0e8aa89a6e8aa71ea9f9d2258683d16f5bc2b1e42c15002354f4f73a116ce7519f1587d38bb5636d008dd91f9b3888cb41d8d939abbb371a28aae6a12cec4047f6caea905e11381898d7bc000070000000000000001601000000000100991e01cfe51ddd933fb59ed0e73e5d72825a7749b60fa32365b9f026da13543f5c5ba2c2b01a5cabf747b9936b3801bffc3ce6620b55c192a2b164ad585d4f4991a91a3994106cac8a98fa99678b8e454a0f12438bc57344acf5205fad000000e0"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='t\\ans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000c000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x240000, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="080000001024c651b409b3b1d5d290ab6de45ef87cd9b601b1d6ce55a194fd86bc7f992846bac1cdc59cd84a3242cbd69ede711eb9668fa86e2514c090f6c17333ee58f035f1c8616a20dc024df1e77c1f2a040b50092904db9c3e18c5c9b9cf18703dd0e2a5daf1e44f419e2f333ae860404f89d0651d866b8ca1c415729fbe804d42169d92cbfd2d5372ee652bb55638e5ec793279e33b5e8e14f02d6c9a5cb26c42667040f4460d83326fcdf93e", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r3, 0x9, 0x6, 0xf2b}, &(0x7f0000000100)=0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x105600, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0xf6ffffff00000000, &(0x7f0000000040)='$') 07:59:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tr/ns=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000d000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0xffffff7f00000000, &(0x7f0000000040)='$') 07:59:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000e000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:19 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xffffffff00000000) 07:59:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tr\\ns=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000f000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0xffffffff00000000, &(0x7f0000000040)='$') 07:59:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="c00000000000000002010000ff0300006c0219ac763abe89a0819c297c96b4e9465cb508773c19db654549b22f1f022aa737e4243e379ce5d3678a4fa0aef52cdcee6f63587e53afa0195d30beb0658d2b263728fa257aa437c7bdc19188e5c786c59456f52e18bb3e0f7bcd7bd356de5348fa0e8aa89a6e8aa71ea9f9d2258683d16f5bc2b1e42c15002354f4f73a116ce7519f1587d38bb5636d008dd91f9b3888cb41d8d939abbb371a28aae6a12cec4047f6caea905e11381898d7bc000070000000000000001601000000000100991e01cfe51ddd933fb59ed0e73e5d72825a7749b60fa32365b9f026da13543f5c5ba2c2b01a5cabf747b9936b3801bffc3ce6620b55c192a2b164ad585d4f4991a91a3994106cac8a98fa99678b8e454a0f12438bc57344acf5205fad000000e0"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='\n') 07:59:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000010000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tra%s=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1557.956435][T23189] ecryptfs_parse_options: eCryptfs: unrecognized option [ [ 1557.956435][T23189] ] [ 1557.981525][T23189] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1d65", 0x7, 0x481d0081, 0x0, 0x0) 07:59:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000011000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1558.037231][T23189] Error parsing options; rc = [-22] 07:59:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="747261c0733d66642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x11}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='\xd0') 07:59:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000012000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000100)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0xe}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x414) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:20 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x80000400201) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000018000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x88}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1558.704079][T23210] ecryptfs_parse_options: eCryptfs: unrecognized option [Ð] [ 1558.739352][T23210] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran#=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet_int(r5, 0x0, 0x22, &(0x7f0000000080), &(0x7f0000000100)=0x4) r6 = dup(r3) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000000)={0xa, 0x4}, 0xc) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) [ 1558.812917][T23210] Error parsing options; rc = [-22] 07:59:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000001f000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x6) accept$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x612041, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x1100}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran%=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000020000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1558.969528][T23239] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1559.004051][T23239] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1559.024287][T23239] Error parsing options; rc = [-22] 07:59:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x3f00}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran*=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, &(0x7f0000000180)='{!\\/(&-[!#@$^\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000240)={'icmp6\x00'}, &(0x7f0000000280)=0x1e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, &(0x7f00000001c0)='\tC\xe5\nL\x9b\nP\x05\x00\x00\x00\x00\x00\x00D\fh\xf4\xaeV$\xc0WYG\xba\x9a\xe4\xd5\xa4\x8b\xfb|\x97\xa0\x8c\xaeH7L\xbc\x7f\xb4~\xbf\xa3+r\x0fr\x13\xaegE\xb6\x9a\x92\xe7\x16\x82|bW\xef\xbc\xb8 \xa20\x85\x14\x0e\xdav\xc4\x0eHz') 07:59:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000320000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0xc00000000000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran+=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x8800}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x4124, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x2, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}, {0xfc01, 0x5, 0x3, 0xfffffffd}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @multicast2}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r1) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000080)={0x80000001, 0x1, 0x8, 0x9, 0x1, 0x2}) 07:59:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran-=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000024000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1559.643253][T23273] configfs: Unknown parameter '{!\/(&-[!#@$^' 07:59:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000025000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x1000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1559.702906][T23273] tmpfs: Unknown parameter ' Cå [ 1559.702906][T23273] L› [ 1559.702906][T23273] P' [ 1559.730933][T23273] configfs: Unknown parameter '{!\/(&-[!#@$^' [ 1559.741171][T23287] tmpfs: Unknown parameter ' Cå [ 1559.741171][T23287] L› [ 1559.741171][T23287] P' 07:59:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x120, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217", 0x42}, {&(0x7f0000001b40)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760", 0x87}], 0x2, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x210}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f", 0x1}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65", 0x81ff, 0x4c1d0000, 0x0, 0x0) 07:59:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran.=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000002c000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x11000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000336000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran/=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:22 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r8, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r8}}}], 0x20}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)={0x2388, 0x2c, 0x20a, 0x70bd25, 0x25dfdbfe, "", [@nested={0x20, 0x6c, 0x0, 0x1, [@typed={0x14, 0x3, 0x0, 0x0, @ipv6=@ipv4={[], [], @local}}, @typed={0x8, 0x80, 0x0, 0x0, @fd}]}, @nested={0x223e, 0x49, 0x0, 0x1, [@typed={0x8, 0x21, 0x0, 0x0, @ipv4=@empty}, @generic="5d8ecd92f647957e34467b85982384b6613b15463d688bc68184f601db13954c105864b56127c73fa8e57a33bad057c20d809a5a83901c299ad6094bfc82c4c0a4016a6fd25c8cc1a19f97edbcd415792b6dae7361d6c926953be76d9f93f55b7bad27bc2c8d7ce30372430e829c9c97e3b3d391edcb888316c5fd44ae85ece26b403bee", @generic="e0a1fcf50c6b8977ab0d2f98e684e5917a99c66c70c90a13632d2c2a8710fffb0cacc0e3e70661db0ca8850b004f2085887a1736ef257d717c8dd752bf892ee85346786800379d61e46ff1201a745807a97e271f3d011610545c727675f66d978546c744dc5f1e128ef3fe1ddd80a4f42f421ef06fa6a3e1dfb79fefb87031b7106f6b65764b7ba859af42ceb480a3360ddcd5a8ce94ce86ce3c33c0b12002918774542743ca7b4209f201ef05af1382c7be21284e06a6a763911629ad11404ad820e0a61343c31eb7c23ec8c7a1a6092ceaf59c749702933665d6611f396fee4bea5eabec780bb9d5de26e80a8ee5b1945e91682f93a0b1a362a0500c5ae872bd581b3d17febf0321ed5a64288f9f2f2d0f8456a7d66edc46b25729950a8cbfc905718aa9e744c522d9eb7b76898aae0547e6b0b864edefdb23c14c64c94a7392e91a54a9e65b96bf171efde5bade9a541f81557e363db48834be0af819f9a989bcae14cfe852f7658db60ce4d78dba8a0b3b1cebd8bd77becf859d88ddfb288da686c0e1754cb0ad73c95950d6d44f8abdaf5bd63c39af014edbc92b2bb2e00a758e116a6402538ef776811c797378ed7ccc396feda699443631b93ff66b9f620d244eb5e4db039b40e046deafa37b3f68243e2142cb487b4690d1bf0e37253d72657b34971bb8f5727b1d9e87c5356fcfe15f87ff0d57ca2e43db493155255979d9c522ffea63bf23fdfbd39c77120c9361663999c380a72257ca37841b60d0cca671127cece707b461cb8b6bd3b35404eddf293cdda041cf01a8a704056db2788af432540185d38ff7533a2f51cd8a57e75f032fd33d01ff520cc30bebbe3c51158ec008ade9c2b8cda58eddaa744350291ededafbb62492b83d1ce4d399664aee22224db3c91f43db86eda96283a2a5dc76e65ee7c83e84c589e37fbe28950225b092749e1d1ef36ef63d83335c5e3194cc12807457af016eeb788a11f9beb5c0a8998e00348c43530f3ae3eb9be180fe93f459c6bbba3a2f99b71067b3eaabce9a8a9cea24f7bd14455162454401131b330f031eeaf528322c3da0194daac4f6242a0242174acb1d488a5db41de47ba127cbc8a64ef4d54daa0c14e64f33ed3975aafdb87a43e5ea1f6cdd8d484ac5691a08140f224ddd168005fa5a1f9db2b0d95735f6b37f67b70b378db599cc43e1ba88d305a5e873e003ad22a20f26a595fe5dc232f42b5b647b9c623a18cdc0a7bc642fe4f49b19e262b01b9d7479b4dad20622a01d90100d2fc7a792d9e14cfaa787103d8fede18f4050371df46dbcf9865c41f5a6df5c82ab44c11913481758a4e6d0282751ddfe670f372dbd180d4664b56577dae5660d52c305449b04f9d1ac805605be0412e0dcec350b78416841df094009732e8494806f8b5ff1709906a4d7c34beb73d286407004434fb9902485971256ade16baa4fa6b01906c976fd6512d09b874d7b855c3ff6fd162b08ca570ba6cb428ed41b2c5aaf8f25b8582b5bb7754533c1d3b6a92ea303cbbbaf419eb224cd0594c8fab408ca30c9ee7f1237d9658cc1e1c243013c8cb20f13a50804ba7236c5c8e56eb39f2435aea2880cce982043da1683269bffb8c30be57432ba395117eca9fde46dce83cef1796794030fe4c2e1ed91b9b533cd1544516c412dfb8996101ee434c970a205a74c541bfcb52f7ff6a5326945b72f8056655da518ac94b9eadf1f838c44b9ab700d412c243eb11c9b6c9da42a36969fabe6f21cf3f9341f2501e099ce864fb9ae1e1ede283ef00947f8f40d77ff2eb4f5f49649991875e06adfe1c8c4c4a360a2814e5d37050c6906ae4f5722d9b8a9d7bb8a1f96f4120528caa08bbf402b91de97299cbfb1d262867cbd6dd33cc16379d086f2b6f7a19a3cf1d519080b73e704ded6e351a1d00ec22dc7f538552117db8ee5a33c391c7cd78dff0bcd5ef0aa978bb5ccd3cc60c12a9a16907bc78574699bdcfdb6cc509b87c001a292798c010dd14e8f3bcf497365c9bf7dea6828a26ba42940eb3906974149a49cf042e967e1873326c900012e7e84fee8e2ec12b12c4de15279bfe824ab5209ad06a8f2474e160c190a4891885504c18133a7e22e2524e7143247dfceacac7acc6cd2c96f80f8e099a30437c30d069120e906a343266b17a43b693397e8a47aa051391942fc0c4c3a3069419d3248dd48d7fbf16178afc8b2129c7de64f6cbba21a271d54add18d36a0ecf9d1093bab7d77f54ca4d346d809a600ba45910a113edd5f9bb3d312d72bca7a438d0d0f7815890c4fc3a195035c7b63f87df02ed7169ce96e28e1518b4bb60cd5a3c952125c4ac45b06d59f560cd87a98a34fffb642ea2a56ab2cc1c737b42c11845c5b77abd0357c57bcbd12ec415f9c4e082ec47486b499f291eab7611a50c5c879048ca5d97cf5f97a879037e03c37c7f663f2b2870722c153b459b0eb9a03c23a2e78a5acbf6cfd2dc249c7525b5f7d3252e92f4fb775d4a78cb9eb24170ac0bc3d652f0039e70dc1ec390e952d9a47e2f23b5a908b0b4b907b87135a6ae92a3c1b0ec05781b96fa759b265e7c4222b7c52cb6a8d91a6616ebadcedf0c3b81953ec11e6d9b1c6c83aa0ed8030d40c1ed2ead47903c6aefbc2f22500489709023e8618893d0c1390a7695c7043405bad6ceed73cda2d6cf144eff23a6288cdfe2c4085faef559246e46b70213fc911fe6d6aded29d75563a9dff3c15beaadd1f200d6d897eab8dd07bb2b47e2f55c64e7632747fb7431d813693a1638e126e5f7cd023fdcaa7cc7480768ef39b36cc9c55780f5a03c9278d853053640441fd61610df36e7a0d7b8b5d30b1107c3b368a833cd00b1e39c079cf7b5184969ccfc547f1d0d3977859e178d1cca4242aae4b0a60da5572eaa1c995f413030f975b18cbe1da1d47a33c389871cd00d3428e947c46c8146949c80786b473bcad784d77303ed3ff126fc0cc8655ce0e34cf9265c5cdb97db8a22147c01b3a918567971a25640bbe7fa60ad566d997606a7b2ef2a6b8266ac2574e0f9cf4a48cda85dd8df64a37af38cb8ee5a00ca204d7df6e1c6be8e3a0210da9401871a1100e389a1b3918e756c8ea192a817609e21678f06e2a314b4be8195f61e253dd7ff872e3d35dee48fe8c0606bf1639ef1cc787905f8d54e6c0e639d0adc50bc145ff70d996ef68d4591f5fd0fc2ddb3d2cdf9ce44d61174fde99d0b8a74c2568663c8ebf93e5fae7a1409b917c37e16893e333ead8f30b655687306aebcc3032e7f5eaf2274f9705b3d268e31b50252bf43f465e527cbe936124696490ecf121b89bd605c9c2f5ec75d4d546f5cacf7bc6180df57fca196d23b6884367583f41f2253e904ea32bfdbab69fb0e333fa29cfbf1fae7a0c60bf9c498bf19b50ededf1cb53a56b0db5797deb7cc6f6684f598b51fdb05adfc2b4c541df2cfda07cf992c790f8c2097ccebc52e8d6e3e106f2d2e51a576d050e92ea1d77e5dc1ca67751791f7a2ff442ba8857fbaa07cb3fc321bf53204fc2352b222cf8f74baf097451a49585bc9f134ed615797fb418362d010e116f4700ce3b71cf75996dfb69f1fbd7bcbc055acea1ce8a26a1335a01a397bc02dc35c5597a9ee55e1cc70fd845f7a5529366a8170930fe54a4ea615b23cd1dc287489f5ff1097dfaf5684ca48a2f363da7bf5f702c0d6fa0f5c1c09e029df4d160880593000aae944f15711c531262e8d23c719aec049b1069bc3925e4651dd48a9bae7d8070a5576945d747fd38671a387a5be67e063f86c38a0c1eeec03359e822b2d6cae2c6b4844caadb0c07049f75e198b3c1c63501abb2536e8b2e625af5bd90c3f9865f732f97ff1b9877397d357dd111cc1291274c4cb5b406e1cda71221e81aad7de0a60b47fb6fcc9ea69de1169afae563edbbde9858510d4b3013b2f1a482b46fe4bfb99825ba473b3aa92ca960e724035ce99f1ae4044c0773c82ae636a51a89e7e988838637809c0a9fd53a240e5706a5ec1d3301fff40d7e35b120ba8ed7ef69cf016af523a0233ef75877b074b910694df6224489d069cc1b8a09d7ae4ec5de274741e729043e2cb4644582ed3541a6401186f7daaf37454cc0c648d6f1743506fb36ec6b0cd95010fbda32b43153d88873b96b033b3d7ec56cb538ee48a370a316b07c2dd789963823ab189e4c9eb70daa4e1c26a12414f91e3ffa06d7774e796903f29461b16df3a898e88e7db0260f57629128eb5797e8f741de90ad169e83c29d3aa2a5d23573131fd6619899f9a69c739655fb1d9b57f8c1d84ebf26431ab87e1552e3d5db28d6bb6d723f0757baa39b9e178c2c56921732b7f2d2417a41c5bcc15b56c626eef71f29f12e718592f053c34a5940ef2aef98704f3083ff9c37cc3c755099a204f150340965ed68e9831aa02324af34ad3f5945ebe6888602bbf28c3584a8258920e5d7787cd8ec7f5ba1438ac0c14008ea2a9ffd8c1a9fc208215e3dd25489d8b368dd5106f0c8d9f05c9110392a9cd7589b3923beae4dcef1c05df533717b2685cb2565fcb7436565d74e7ecbcb5bf7c1293e18a9fa3307231c6a6f38030ce7368fdae70a7387b835a228d6fa7f86f78e571669fe22088f542eaa8f615371d06252285d97ec9c620dcfbb2863d92b1d95c5f6a1445f4e7df3474fa25c00bc103890759a15f428eecd0beda080462fd1e6667e67f99e7a8651a2b6368fc6a98b0fe84384046469c78d7a71c73d236e3810df3ad66e0e1890d9ebc38fe9ffddd141899255b31e3ede34901d4ac180ad54f595d3e97949ac2281a9d5e75f5e5861579f4069ee4271261d9ff7d93cf870506f568bf20264c17503e2d9c326cb6116430f38f7043106bdf60920534a508a3bf96ef7b54070bfca43e68031337722f54f0810f23427fb44f136492e5f008c062f5d7a732adbdf8ba74c0053bcf780bf3d4317735a4f3b448d1af71aa67e50cdad7e66cc5c407982ee220e35b04a8f81d1c00b47bdd7ab7c49bf32e5cddf19dd859a4171000790b31289fd93b2fa124fc9ae63423ffc6cf8cc0f6ef1c771fadb5033974c11636e92f2bf9f4f52ed3ad86acff4fc181fadd1e9e3caa28d26aea0cdee79f19ba3e72c65c71d169972968158e740d27068b5b5046f41bfad8457d5921ad8527cf738f75d49e201209da98310630812f0d00450bd1fc16213b6f06f940f9213aa698437e3defa4d9f63e668709848b96387f6b2c8c62c320316f550afb35e687b03ce3e89327f70edec557c8c2e775ca2a95943e5e309a5e06825614e94f4f67bbb2ab6367e6ccdd78589aceb07d6f64c175b3a2dead7c115fd006ae9dc41a38efa124365eb57c96f305603358bd06dbd251969df7f33475f4c22e71d0be4caf60ba69d3ca6b5665749069fa9aaff3d28446df68b6107c85f0ef1d37907c60c3d72038f15377fa6f5d359306b2a1aa2bf991ba3341b959aced8e4c82f8039f31f20af020094732bf5fff610f2f54b11dd3805f4fb21f080f0c5902c464e888531bee6a8fc53119ebf69958f6607b4ed47a5e505024aea62484f6e90ea8fcb01b06b5756f274565128bc420058d8949777133111b254a637710d9cf747aa6fb7c87c17cf9e8c561532e1e737da41091287b9e202cea77d40f19a414a125f17f0a64fcbdaedbacb680439c97c018ffee338ede148552d57a8c547d5f80376f9d85b0e8c5e1c07aefe8c7614447922d345d594b7084d863fa21af96b50712c4011dd7def5d4f5fb166be824271f02dfd19f1f15097d485d5", @generic="4f35fc231e2a1907d014438cb5c4c0dfcd2e17907b215c78b790aa0c51262445a107afd2f777e2381c0ac6425046e55d5ab6893ac7f7cacb9cf8c13379410b0edc7cab34664c186eeb187df8b4a37b021559daa991c8819eb7b3b86a45d810b945e5c3fd53c651b537d8c5a2993d508227d860de8ce3215e3d4139bd16e477d75c0feed2c92f3a5e4096d9d06b40aa088ef5de887cdf1f7d311b3fdf4b039a89b67a52b3948609bfb13f4cb0a89ddd9b1e51ae1a7108c1aaa089faae1cde1ff5a95d8b93a2a94cbc24c526507bf60cacb045914c305d6052c055254939b11582c7c3f8d8", @generic="a3d3403bccf62c8e6f75f87ee989e3ba37c0d541590592cee4e39006e42379d41ca886154053ac99ef913b3dd31a6b427442feff1a4dcac1c14ab70b5834091b6ebb1d7c02d6c0567b", @typed={0xb, 0x6c, 0x0, 0x0, @str='$\xb0/!(]\x00'}, @typed={0xc, 0x77, 0x0, 0x0, @u64=0x9}, @generic="a1b6ce3b842eccea37113aac69eab110de9f13606c596bf35a3c6716354b575999d1ab03d1603ed5ade90ce36ee74f053ae3a7673f533bb7ca515b063a34d443670dae9d06262d6f517d0b6d2f191d8107a0db2befc5b3893713f0ed4c2c08e179", @generic="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", @typed={0x8, 0x5c, 0x0, 0x0, @pid}]}, @nested={0x8b, 0x3f, 0x0, 0x1, [@typed={0x8, 0x35, 0x0, 0x0, @fd=r2}, @generic="464440ecc1fd9c703f9f1b6e7a835002d6d176ed4c97485fe1aeaf2b165550a3353fe48f11a4b55ffd7a54c97d3520217cc1df92840415c2429d710d8c54c1be08d0cfd1030eccf2bf3d55a524c6a170de5957baf317a0423e0f4e8bf8264392a73e27b8f0dd1a91d2b7df2111c8417a0a1e43a04ba95c", @typed={0x8, 0x31, 0x0, 0x0, @uid}]}, @typed={0x14, 0x46, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, [], 0x1}}, @typed={0x76, 0x47, 0x0, 0x0, @binary="ac774593777c4440e36a214342ede4a5c3fee32851329b777e72a69d7d8b86a903d7b2d870b19c71593a64edfb092ed28e81bd954f206e41d9ca9969b0dd79deb15e88acb04404f54114d4faf6fe02378a07e655ce3e7a16f8a41d216e7e606d899f62f33744417137207a2780136d5518e1"}]}, 0x2388}, {&(0x7f0000000300)={0x1bc, 0x27, 0x300, 0x70bd28, 0x25dfdbfb, "", [@typed={0x4, 0x5a}, @nested={0x1a1, 0x21, 0x0, 0x1, [@typed={0x14, 0xa, 0x0, 0x0, @ipv6=@private2}, @generic="4d5f58d1643fe4207815e819aac8a70d76db6c3c53380d699a2fee207a502c9b93b9acbd54c8512355b7835847b63e105420472437a54b4733c64c0b9b3ea1ed295dc979c20e8a97e38093cb4cbcc7d235159a5f2a2281ece5fd679ec0ca25e4bb79baf0ce73117f9ad9d90a453966c27d6075c79b4eddaf121b086b9284f95a42cea23ae384ee2913cfe09ec46f9ce24d62f5e015aaa38d2daf2c3967be99b8aaeaed92e17cf35ae4bf8528d3db1dd9753ea28f6893b5465c", @typed={0x8, 0xf, 0x0, 0x0, @pid}, @typed={0xc6, 0x2, 0x0, 0x0, @binary="a70b45693f821b9a4e68eb82d262368a7e61671348ddd847858615247742a4c23f89b8a041f4e95ffe8d4f70565fbb4cc164ebb06894b6c7b3214f9a60059d3af57a9daede6a4f134c79c8a8facc716afebf24891d1f5bd00f51e11b69c202af0f3e4b5e56804e636ed21c5ee9deef71ed04fc785933bfe13ceb8b8a4f05a102c43317f5184bd7fbeab3e5ee15280f46c01cab5bcca5d74cad52441e95f67582ee6da1252e90facac62f315e3e234b68c7662d3067af8150ee84f2e54d44d1867b57"}]}, @generic='X']}, 0x1bc}, {&(0x7f0000003480)={0x1504, 0x19, 0x400, 0x70bd25, 0x25dfdbfc, "", [@nested={0x10e7, 0x7c, 0x0, 0x1, [@generic="f5039ef3e4e780c38569e65d30011a85e9f4274140edaccd6a654daef29a387efc3193f2850cf150c2a4141dc45a4a8d1e4a7ea5013ca48aaff9da21ff2a42c3a9179bf426ce049725a6f9a3f6c9ffc558e26b69545408a3eb", @generic="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", @typed={0x8, 0xb, 0x0, 0x0, @pid}, @typed={0x8, 0x87, 0x0, 0x0, @uid}, @typed={0x8, 0x1b, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x5, 0x1c, 0x0, 0x0, @str='\x00'}, @generic="210ec7c199a1ff1b716455932fe6b795891901ca3bee6cdb8d81f361575b2a20ddc95b50f1ae5d50869094ce520911b5198f2b630ab6fd52a743fc33910340280e58ff784255c053879107303c29247c65e780e79005b7218af1f940ca777be8c524ddf929c60d35ad97"]}, @nested={0x4, 0x4d}, @nested={0x1fc, 0x5, 0x0, 0x1, [@generic="3d8b79c1aab847f2b1b78bafd06c62c906ba1917f72d2fb18eb9acf9d84677a7ab433e2da60bf574a3313a253660d03dd0e71f845b669111b6f3cba54fae67793cda06d7c16df8fad53c4303cd78b0159f30724d23aec9f79a92c671596521e3b434bd83c1a295689339b50fd8c14e", @typed={0x8, 0x49, 0x0, 0x0, @u32=0x4}, @generic="f321b3fdea7922be21", @generic="44bbb96deea8f727b19e36cafa13f22cccef1fae699997d129cbfcf6dcf941b58b8895d24c0ce6fd3eb4acad8ca60175aa45c063d3ca557e4b312d1c4c825095b81bc1581f7a6e6d6bb2d92d4b9b59dff75a2d023311bb20246db591122f479213b9dae07547e9e308149d2ae97e723b6f0bb97c13db4f9b4d3e2678d601a5a827c770206a03fa1bb7097a9f441ba3e81ca2561b3869ffb70c0503c1e309ad7bd1c1b27bebd32d225a62bf66504ca7d45aa278a5a72a0a8181f228ced3c33298291156433e25bb", @generic="83179d89804987e339d2240662017fb75dc549184e2696a590ac72566297d7e85ab0e4c948a30daad235d304cbbb929b0afccb562e0a81", @generic="f7be72a45b212581bf98c24b765b78710803bd218c88a0518b3a11188b28b423354f11657855e86044c2cbef736c", @generic="7c150a7004fd3864fa0eec63bf311446f7b44349679c4e2b1344ea36b73733bd740e9e53224862464d6594ce6335bb842772137c4e8e925b6e7f3940", @typed={0x8, 0x0, 0x0, 0x0, @u32=0x5}, @typed={0x8, 0x4, 0x0, 0x0, @u32=0x4}]}, @nested={0x20a, 0x56, 0x0, 0x1, [@generic="c50234eed4c3e10c31a9c92e87edc9e6c103d641dff65f1312f27e5844f8e49a224770eb9e4313a802afdb9834c74e9007f9a1d6b58b18eef76cad45f1c233e809ec494f42fd51ca523513903863569e9090f6d1d9e4bd527d4cd63a092280e6449a8674f5ca56913a95dc728666b04c7abda8475c7c4cf064b76c7a9765294e3848d8eba7cdc5", @generic="b4bc1e4e12abf05bf4ccc0e537e4d7e479f9b10af8380510f93c54b05c313031045059dba2bcfe09334d5fc82535f9f59ebc6b25bda13cdb88a5ef2426dcb49cbf3c89ed427639793184ed129f541bf99bde79456b8b9c240ac1d644566d570755ef99c7565dbb8a8cc2b1d0312b158d5a12cdabb3b7216a3103c03f3a7221df9fe91f09d17be0a5fa8e1cd7f7f2c852ce37e31800f82e5416901cc06ca7fcf6fa93f66ee1620d5db77ca41a56eff89efc19bfac9d4f35af206946d6f51be81323b7c091064f8cf209eba65d36", @typed={0x8, 0x17, 0x0, 0x0, @u32=0x8}, @generic="39fa6f73cc8e19f428ed9a71809bbb16cf9a543a737e12e7ba9da0bb71abf8f2a3fdaf02b3ce81cfbb2579f2ccf7b94c6b19e3982afa16f29a5c6c588e466ebc625362eec281a91ea40e898460fcecc49f5a56a6f8eb098baac18ec0e4a79e50c0e2ece555648851e31d612d2a99d62847dddb787c8752055a381047ee658171f0c7d9892e578c9776bd6780d28262785aedd22c516ba7ed4bf4c61629df58d6c2ae1cd6c7fb", @typed={0x4, 0xc}]}]}, 0x1504}, {&(0x7f0000000100)={0x18, 0x28, 0x2, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x8, 0x48, 0x0, 0x0, @ipv4=@local}]}, 0x18}, {&(0x7f00000049c0)={0x29e4, 0x1f, 0x300, 0x70bd28, 0x25dfdbff, "", [@typed={0x8, 0x36, 0x0, 0x0, @pid}, @typed={0x4, 0x82}, @nested={0x10f1, 0x13, 0x0, 0x1, [@generic="4ed2308aff44713b1619452697bde47c27bac47df28b639cda1a35b603e376b26ffb3a38eb694441b20982bc6c710dfb0fdb955d259e385c4c7ce4982b35c114079b8a", @typed={0x8, 0x43, 0x0, 0x0, @u32=0x5e}, @generic="a61b6bd029df5bc012beef27d02d79ed0de71044c3260b31108d4353233cfe9b4e2cdbb03e0551ee998c6264a8e4e164e5c602e363bb05cfa79b2b380203f3d4d30a35a7dd2584410c95b85c3e4d72269a1766eef24b556edf8be9b7fa7fa26fe0b4b1f0898fd48c45c560d0a7e45192ec608aff6bab40747560d0d6", @generic="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", @typed={0x8, 0x87, 0x0, 0x0, @u32=0x2}, @generic="8c22e7ddfc3611d7a9925d2d08f62d9a4b1cc2bc4d98", @typed={0x8, 0x52, 0x0, 0x0, @uid}]}, @generic="1e6b056f828530da3b1fac433e316eed7861a1b5b358fa81491fca688a34d0b69450719c2a2e88384499d95c1afb0621ecdbc09264f247e5be94a9c806", @nested={0x366, 0x31, 0x0, 0x1, [@generic="4564ef89fc017028d302a9049bb7895abf4f1c2441e12ef8b815c37cbc3b503b0b9389f926d26b8a5d8ca8deb5c4bba31a3f59d692f354fd481f1b5fe24ae0e52ec198a1a1606e28532aea8ae6c121b9f64b5e6e60df1b4c3175be6dc46f1ffd525ad0ae22d0914df72aee735c51b0d2772ed975a67c4aefbecb8c0a49ec9bfc64c0719e273f9cf99d566c5fa28df5d379868ae321ec5359e78791b0ff8674d52db15aa2d8b9842089feed6dff74bec5e5d197f2", @generic="c697a3ad778accb84322b5dc55f7b2e5d9c4c919a5634c98f7f5fa09e324f6ea38e11cd334a500efe290c74e93155213b5acce0a6a792e09af1838302f1fcf92fb52882345773aac314553f64d71391a6df28ff6c227b563b1e83db9557693055e0fd1fb530e7a636da52720040125bda1ef24580172311b8e17433fb43ac47bc70d7dd1545a47fdf63b1be5ff34039684e79e1dd4fc7ab74bd89082a9ecee094d99b658495fe19a76c413ba6b0ec89afc728d721584a735b4f280feca389648f3cf730caefffed4", @generic="ded6bb38710bcbc315205eb79f50f4a73bc2e84e0cf4ef79f764f4c947675d88eddc89f9acc87d940411f9756a824a64af026cd7c04e84311bc625d60fd2fe26eef8013cdb607bb7e6aaecc4490a17d1071cd3acbceb3be05aa4", @generic="eb709ca4545af444ee54028f1491b3f940adfffa0ea0d86555d7b0ebb2403968487bc7f842c268080a0adc6b4ca093b5f0d241855149c17639d8f7fe7847578f9ed09580f786e4817d", @generic="afab08fcad8d7090ab39d2dc51f261c18330fb695f28f09f5aaf41e568a3cd0f3647a22cbb8ae5e4eb1a575ac9c44cab21164d2efdb0c8197eaa5d17dc4f42baf400e83c5ac5e138fb4d3dc1531135092e51d4e241477c79249ca321a5807852c172baa1ef8e723071c91036ba2ae623f86b3e9cce128c49dd235676601ed903de2615833db2bc", @generic="a446de3e3c01c8801973bcdc1a12d2d3fe25b77973a47818d6a98700d79c94754b2c9a2c08c22f9788c1adca88702f5b70a65942a83ffd31d506c372fb7fc641ad4d2b76e5b38f9b068826f207a2d2c724f8ef53c41deb27fefe4d1a13b92d0c8a2fa0aeb853f61859d6d7a6af967d042f9b3b02f29c62c5df4f8599da79a4ed711d629a93e42cb09aeb8c75dc04a5fd4c878920fccb3ab139aa82985920bf29423c38f0c6128670f4d3720f8032552435c54c59bb0ed3d779fe173a"]}, @nested={0x14a, 0x1d, 0x0, 0x1, [@generic="e282e5e63a210adfb1786a377c606c63fa848731b4e9186b2e2352ccac086fb1dd0a7371657560941d5848ba2072228a755e943635cc2ca31016772363c0c18c48516d28051656a1b86cb0518570b6cd663cdae54b68", @typed={0xe5, 0x43, 0x0, 0x0, @binary="dfae57cde756f75e422820e736d8b554064b587e686495d33a0c34c7783c644b60d709c0ed75cac07af7ac050688d38ba10a0faa87727d206f8b43c237d1fc74080cba69e8ebab57946240ba6264eea8adcb6a2ac01ad61b5d967d950ecbbf223e2ed3993260716429a876dfa9db988c6feaa47e62a15f390baf0b7419822549919be327324d47145c13b31a26e4a6b394d27b179b6f9e445834552a6618ceacbb61a475932d7cd635fa41d16b11e45313901f0cfe5cd21239ee6777cacb8beb24e2e0f5ce810efc3288144f352a3bc2ee5f8bbdcf2a59690369d06da1203a3d78"}, @typed={0x8, 0x47, 0x0, 0x0, @u32=0x7}]}, @nested={0x222, 0x93, 0x0, 0x1, [@typed={0x4, 0x2e}, @generic="6703a180dd813a935e8405ea419de36eaff5c8836fd618334a4ab5ef2041ae93ad06ccb407c14377c578c264ee9e73dd0dd03eebf0c5e7a3196bbed2d4119d8106968218b319c4fac87c0f2f7619dd27dad01a5d7e5b5bc7539bd13ebaa2047081e65ed65717b9447c68d0cd9f2f41b2c87751f52456f6d6", @generic="9d3803bea86d56d2fbff68522c0df1fd8a554a12d6aab2d67290e1bbf9357aecb1a9255f4f1592f5c810bb62aadcbcf886c057b98e6b94877dcfdd749fa0214d64e50ce30c23320672d50eb9f90823a73abcf44483c1831c841477d640496cb85ba45b0824904f", @typed={0x5, 0x89, 0x0, 0x0, @str='\x00'}, @typed={0xc, 0x6f, 0x0, 0x0, @u64=0x783}, @generic="c439294f0310f5e727a578c6d9fc20f9c898a2acb6e8f9647e77d3af9b5306dffa923ad8f4d692065d4846c5ea4ebe38645847b42e93dfff3ed3e9dcf8ffc5697111695e903e2ea0b183686a695c8de15adc3aab31a1316435c2725b8f3e65ed978b8f224090ff1c9e92abc45ef7b11e504ec4bf4a053b5b6faa3eec393bf47265b09ab90ddb6fdba545be289058012a9062a90d8e71dfa63820b53c97c588f2cf265e500801390eefd7f9f88175045af2b9324154b85484f6abfc37f00df4c0887ee9e8b9234797f581ef0a3e707a1bcee9c2d31fecc95bce8e705b1f302160dc49cd01", @typed={0x14, 0x2d, 0x0, 0x0, @ipv6=@remote}, @typed={0x14, 0x2, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="68b5174d4d79842e4bb7d58631369603558afd32680f4ed72336dc"]}, @nested={0x1b2, 0x85, 0x0, 0x1, [@generic="c7bd899d9401adae43fba20725a9c1b53d55d867b97132e6b7a6c8766df262b303fbd06d0bdd6b639470982f368c73021931215057c1d4c4b0bed96df57f205e4d2658ca2aabb8e094c68a380d6929fae3874cbc7827e5374c54b324ccad44ec42c7c4be1371b543545d72899ea056bf15488f0cb122064e2aeeb1ebda3ff4b0f3487adfdf4b5b72abfdaeaa2586f4b3", @typed={0x8, 0x2c, 0x0, 0x0, @fd=r3}, @generic="b4295d61106c7a842115cfc41d771ea5e1641b0ef6a2b1429743037b9413e48a7654140fad87dc9c4fe308283e20478a6b569a64105ac479d0ab2d8b573f2f46848b1793bd8d3ec4d047569c2c6807ac1a0af2b9b3886a02d473b27c0632c891e5b6e9b69c5d85434b413e27b5af60cc53523eac26b71fd3a0830b5f55a147d52025ef32209e366b1006a9d86b541a082bcad4cc8e04a6030541", @typed={0x79, 0x59, 0x0, 0x0, @binary="5637bc67fe89b3b0fffcdd68a41210a789620f112748f41e170ca8fce3c0804b81e298f7a0abe5f2526c5fc755ad30204cf4cb917dff8e13bb02d6183271d7ce729fba92dd4d2e42ebf7de875cb7a67191fe9caa366b48b4e581f69ff2239800a4b468c9b13863cfcbfc66c558dcbab6623afcdd2d"}]}, @generic="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", @typed={0x8, 0x6b, 0x0, 0x0, @uid}]}, 0x29e4}], 0x5, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r8}}}, @rights={{0x28, 0x1, 0x1, [r3, r2, 0xffffffffffffffff, r1, r9, r4]}}], 0xc8, 0x20000000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x11000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran0=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x3f000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setresgid(0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c}}], 0x20}, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = getpid() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r5, 0x0) sendmsg$netlink(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = getpid() r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r10, 0x0) sendmsg$netlink(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r8, 0x0, r10}}}], 0x20}, 0x0) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000010007000000000002000100", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040004000000000008000000", @ANYRES32=0x0, @ANYBLOB="9d5f655347071f3dbad9c882fec9b5c3101db747eefb1f6835ed908d8f09c7f504f4bd65b86e4d5a1aa5128e8ea83fc4945f58b5bb28d661a243a3b17119eca67ac2bcf37054370428ffc8cc0d2b04eddfd1e43b312a7ef813f224f2b88e83c3896b626e7cd08b6a2bc1057ac619b8aaff2b64e5a355a5f4570000000000", @ANYRES32=r0, @ANYBLOB="08000400", @ANYRES32=r1, @ANYBLOB="08000500", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="10000100000000002000070000000000"], 0x8c, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000003c000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranA=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1560.204729][T23326] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x88000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1560.250914][T23326] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x9000000, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000003f000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1560.297552][T23326] Error parsing options; rc = [-22] 07:59:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranD=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1040403, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d, 0x2}, 0x2c, {[{@mmap='mmap'}, {@afid={'afid', 0x3d, 0x6}}], [{@appraise='appraise'}, {@smackfsdef={'smackfsdef', 0x3d, 'ecryptfs\x00'}}, {@subj_role={'subj_role', 0x3d, '+!)+]\rf\x81^'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') [ 1560.453063][T23356] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1560.465273][T23356] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1560.499853][T23356] Error parsing options; rc = [-22] [ 1560.547784][T23357] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1560.555107][T23357] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1560.574815][T23357] Error parsing options; rc = [-22] 07:59:23 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800000000800064000"/96], 0x1}}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x7}, 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000040000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranI=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:23 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'system.', '\x0f+,{\'\x00'}, &(0x7f0000000140)=""/60, 0x3c) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) recvfrom(r0, &(0x7f00000001c0)=""/249, 0xf9, 0x80, 0x0, 0x0) [ 1561.018656][T23364] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1561.054040][T23364] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranL=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000240000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x1100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:23 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1561.085186][T23364] Error parsing options; rc = [-22] [ 1561.104403][T23364] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1561.121837][T23364] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1561.147724][T23375] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1561.181604][T23364] Error parsing options; rc = [-22] 07:59:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranQ=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:23 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x2000, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x22c040, 0x0) connect$tipc(r2, &(0x7f0000000100)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x1}}, 0x10) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 07:59:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000048000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x3f00000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranR=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:24 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x3f00}}) 07:59:24 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x2, @empty, 'vlan0\x00'}}, 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000000100)) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40250000101200000800290008ed0000"], 0x28}}, 0x40048c4) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="64001b0002060102006269746d61703a706f7274000500040000000000ee8defc873797a30000000409799d1000000000005000100060013001c00078006000440000000000600054000000000080006400000000000000000000000000000006d34c022c2c06b8d7f538c1aad6811208bf7c6d3c0dcd602e225496aba6f93d2a6cb69310fdf8ef48905911c1976acc062ca8fa1b3aa024ccb630599234921eb0b591f7240f4b8d5eba418a2c076409138cceb40dae1"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) openat$ttynull(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull\x00', 0x400, 0x0) fcntl$addseals(r1, 0x409, 0x2) 07:59:24 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x3f000000}}) 07:59:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000004c000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x121c88, &(0x7f0000000040)='$') 07:59:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x8800000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranS=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:24 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000052000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:24 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x3f00}}) 07:59:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranT=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0xffffffff00000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x28000, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r4, 0x80044df9, &(0x7f0000000340)) r5 = dup(r3) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockname(r5, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000240)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/qat_adf_ctl\x00', 0x42, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000100)={0x4, r2, 0x1}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) getsockname$llc(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) [ 1562.252524][T23435] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1562.281280][T23435] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1562.332715][T23435] Error parsing options; rc = [-22] [ 1562.355075][T23435] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1562.370108][T23435] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1562.405894][T23435] Error parsing options; rc = [-22] 07:59:24 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800ffbffa5f000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:24 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x3f000000}}) 07:59:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x11}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranV=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socket$nl_sock_diag(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = dup2(0xffffffffffffffff, r0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x2}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000140)=0x2) 07:59:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranX=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1562.854657][T23453] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000068000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x88}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1562.910276][T23453] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1562.974543][T23453] Error parsing options; rc = [-22] 07:59:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x3f00}}) 07:59:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000006c000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1563.006313][T23453] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1563.057920][T23453] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1563.087253][T23453] Error parsing options; rc = [-22] 07:59:25 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tran\\=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000074000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x1100}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x1af) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x3f000000}}) 07:59:26 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranb=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000008fa75000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x3f00}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1563.759108][T23489] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1563.792818][T23489] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1563.851472][T23489] Error parsing options; rc = [-22] 07:59:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000007a000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:26 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x3f00}}) 07:59:26 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ttyS3\x00', 0x180, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000540)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$qrtr(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)="dc36ee23c461d5fbdb16cdc034ac2c346dd93bd4a5e2d62a7e", 0x19}, {&(0x7f00000001c0)="5215916b98c0db2081bed8e43520d23fe1ed2dbf24277f6246cb3f26f6678d59ea46841941c73841f4a6d14753b3d11d47aa3adfc187f35d6dae20bccab47418e7a54ec65221eda1fef2c626f9c7598fe60a7d4deeb10d549abae58b09d18abc528d0ef34146eeb06eb1f227f62b177eb701434dc4452ae77f13c15ea91d462ef7360da1da1da2923d17642dc1cd540f2826ffea307d59492cebc3694d8964d12db4f685cb020221e8db78e879491951e38110c90183832faf007e7cd9ad31afb7019e4bbd0400e4738da6fe2db58d097bdbc87f92fba8da3ee84d9600ac559100aa6cff040f85eb8a7b2c08c24be4fdd5676dc95b", 0xf5}, {&(0x7f00000010c0)="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", 0x1000}, {&(0x7f0000000300)="35f30e60224a96252f5af9562de94c78dc42d23e150f79ddec41b409c864941140e863d5af69837e5c020a144702820895a672a77740092c7538f9093f2cf9d075e7dd0a5b08486d48dcc6351da848a2dce1be6abb2c0d731e347da1e1aaead0c5ed13898599509909522a3750537caa", 0x70}, {&(0x7f0000000380)="7b05c57f6fd0cae0dc37c34357d7d8a86c086833e69c519f2f8f932c6bb5d652a8b23e652e527ed879e78a24d731584a285ff064bf91bdd9db0c1c1c6aebdfc8ccbacad1ca73f7525aa943eb758246715e4ad4946d1ee15c8cbff5ca8b52f273b357eeae95e8c2ef31f5eb3ac99e1522", 0x70}, {&(0x7f0000000400)="0a25004c3ecf93d6fea9c9d5faf13acc074528554d5d295a3d72b3f07b60f723f588d347bd1cce5cd5907235611b75df8cb7f14118a33477a169bb9169ead1bccad0f522a77ddc06545061cd23", 0x4d}, {&(0x7f00000020c0)="1259f8e143ac90356a040d20ae16bd13c2d5d3414fc8727c7003340f7900f1373e5a898727475817100dd2b5bfc3b73780e7ccadec454fda24f77f8e9eb5714831553f2e7052ac567ecf4ed108c7b468c5c99675fb02fac8a6c7f97995682a20a0218ce3b1613509a1c01e7152499d34b50bba87c9932e2dfe3b1af1907019f57958552e8fab1c781c882fa790abfb79b84fe7d1e1686206727fb9a40b56d4d9fc82bf0fd9dc5c3b3e885b751f5e262a8e96a8c66f9cf06b3c18260684ff3c407f8d168222b0479f62b083147ccd91472a596f82d11af0eab4d769cfd703acbb3643451e8b629c55ffe5dae2b063682605b578f78edaacbe24e9aeb357c76e7330e7bcfde1061ed24a53922fbe21512af64dad711ffdb660127b342f7e600002094cec8e92cca553eda5f742709b4a885d6eb482dd5431a58fec4fa4f4d4d331146c2981b6b4aae4ec65e0e3634d1ff4c78e574a43b8552e5f1376c1788008bd943b028f7e3a2ef4991baed783f071728ee8fe5319cf0a7dac7da2dcdc0d75aba7d3403728aa3e18fec3282d7a160a6a8f83ab8065e0ff9922c13da02295717be88919c8ad182ca55e4a57621013bf08bf99d35f3f696f89a6f45eae1ed19c8c59e0148140572614436d70702ee4efa100114aef5e2fcd630a4e8f4be0379762129d50c1dd7a5ddb60371eda2d22d740285425a2ab4b5867e151d84d95075217bcee77672984c6e687c3ffd16d6b1479983133fbcc74dc1d7c14298c20f9ed58701ea2facf4858f3d3c56caf907683f58bdc94aaab61297be460db595ee57bd63f4eb0cc2512cbd30f4b7db98fc6919d010a8ed0fe92bafe344d3203e4198c314dbf6f9bf6d3edbf326c3324d73594cb92687c5158f1b79ff8cd2b27d77528b0cc1770259a72e61a8a7e3361a09444f69274812c7d7785630f7d52c6e3ec5e3bbfcfb11cd211367d6971934668d6fe37457efe15caa8e1d26c58c4ecca3a3460294b7d85c074731049c565b1f8bc0552971467de156e84254f5d5f00e148d969fa553fda9a7ba7e9eb3af520f7dbb050b1f96f312a4081d05b19db293002fcd4c3e864ff7f078796f03dc7f7abbc32e0ad64b4e70319ef02ffadc983d0a9ac9406afb456ab13143fcdff28a55ab24018b1dfa17414bf330dcb3c9444b23d31b939d0fb200c48b72860be428bbdc60c808cb8463ea7d2d0f0bdbdfed480fe39c185bd0770d71d650551c77df0243644827efa318e98ad34ff3b679cb284d8389d187ff60f1efd44a545f0109bc322fd851e81994d79cb187606da23273573c55962bbf537e0275c71c8f061b61403e026c91719f4d428409690df330bc671949372470e7d50f99d7bee1b2f48dd3cadc248289e9754caf21f8eeca142be6d67ad26d84b9088538682e9788bda17ebb268eca5d5a5ba9a15c9aa29da18b6685799dacbc11d4a57e5e01ab37bec3cef0abb6d9748a468ee902d8a4eebe6c848498cc1c2e5f43f2a2d32706f1ef867c04baca6509e128578761e8d5d4b08dcf21452b602a17fee719b9344e917c266897d5a0e5f73a66b64af987a380cd8930fdec86e041f6fc26db857b3bc8f6c409577d2f3b9b8d3e5b33ae11a7a549ee9128eb5a021f500d7f1a007c4a7162c2908cdc37aac29a1704879280521496e803ef93cd4ce4dbf5f459f27c18494b2eec711c663f18cf4ca9b2690bffbf346d0a1342ee539b210c8c1e77302c4040b415b3c26fbef99666e07989549194307bd06ec7adab94d390a3ae47d9ec14e42d60364f922a704c9080eb796003c3f6ec6752772379ec1a8b6f1177e3b3e6f42efb4a09c18d9e08bc52c2a5238df9f4626714f3407eb1c0819dbffdaf2f000e4a3ce9be1a029a0fb62c3507d90cf700041412a4501e52a398e2c616259837d42e48d42c64c2534cbbf7041f6ad201247c4625e4143735ef2adf2fb9fd54230b795c6ef8b2d23eb2388b270b7057d3f6016ec297d81a70f63e7faf207e14220ae502a2a4094419509c00bfe6c4459ebc9695ac1069375cc36e92770dae748ad06358cbf85f41b0df49130355ce5c05914b0278897846b6263112fa177583deb187c1423b32917c84bbdfdc122da9e7789e379f854a6f2feb864b3acde8659b4062aba8c0afb7406c70522b0eb58c1e983b69c5cc7b517dfe5f064807f8662f25471a79cf089519395d0f787a85d6e4936b4834713e42656318462a7186e68277d82d333985ca58370d30bfb8dc69432be520a7cc1b9ecb9294ee94639f61ba987ebf3aa17ebd68ae4d3a3f60c8b339b33ab3b271d910d427e23a4505ca9280d4f37cf1eccd88b17c7e03d2086eec129f800de52b04e12182b4eb6e5e0272476a7206198cfcd20ba95dc5d1980642c4bfda0647de14235c0847b5b9e43555c1c5252e7b5cf65071b389b99bfeb13f320401613552e8a148ad0624a88e918752c99a927f97c503c3f48174c11bbf2acdbd52a0bc9c3d51e179f3c5e0585caf1cba091b03c7200cf936f00dddcb2ffcfc8354423f761d94833660ca44a7270ec74d74ac763bfb8420ba98116f53f7b7aa9c2f5a6d682293c625c57b76b896c617a8b91f0aa42027d8cc4381df8f032b170e5836e4d0e51aade8dabb889994e14d609c1b6049e68beb5c13706804776358a70fd1266e2b5ac7f41d5eb21324afa768ae84bd83ff6729808aa4df7893b496f33c0870325b7f49330a2e0181377eea5ccc79bc0f3d9ef0d7bee9e3476b09724b7e94ba69ab5f85948c23dc07203e26f308ae32ac90776017ff5bd524c6367a4e1b5b128f843c4f9c92a9638952d43abb607059f825175381383d2028d6758d54386d3a57b2360a026420953f3fe135b2b00554b5e056b28d7ab3aca4adfb5ba34fb52b7d0e8cd067d9670b8c3faacd6fdc103a8ec7ce63dc59642003033c90125fed35ee72b1ba51dd9228e4d7d669226d7185aff99f288205a18da4628e4ea5d04894550340135f077e5fb7e4ae6b79a9f107949825871e3b05ba3e25b37988da51e7dbab547a3a625b88607aa6889fb179903ef3349424f395d937ea194312a0e2f5fbc664ca41d6a526565f263c7f207f3205fcb3b65673c9e6ddea8a9adf7d7435d79df93195c6435d82a915a1e10ab9362917140dd2debb94a4ca59f161a6cb200bcd749f52424461afc7571b6dbb0d37d01835a8bda074b1d2756563cab955ab6ed9569a186ca69b229b1de00f6a41fa3739bddf57d845b8ab81f4910fc907e368e93c6efa3334a7d20a6fc070d1cb1221dd70305a117565bcbb61bedec101731320107b79f0f1e2c19a56063aa4df84faf246a63bd69ebde81fa583cbd31a0dc2f1eb092c47e5f9ea437f4857c0e41fc4620c87035ce5497fb4e121bfcbd97715292b6bf7e88fbce14ced00fe35408de36fcc1f124bd1af80182532a7ea2ed1b2d2b95a59a06a4e7ffe01b1fc21ab8726139f310dd3a6342971662484b6055027209aac8101fc637bcf37fb36faedbe1c63795545162e57d4e601bca1c231175173ef082b3180ceb95471c29fe6644f1f62f6f529f721ccf5646e4a57663b4f935f6178b2eba1f5e9416fc230347554d90dca3e49025ffdf62c0d695e9414bb9586bf525b8ba44cd8d9b8e799bdfba483d049545e4618696e1874adebcbe44a966e1d1cd303850eb890f61d1f4f2af9983a8391b3a7112ac93717ba3ea7ef273730fc590a6c7bddedc9455843d127dfee19b46883dff49a97e59f12880cfc612e413264607a6861792a7240fdd006684ed39cf7b55c0882b01ddcff60db6b3f00951a2deca474c68756814790297fdedb51fb3b5ffb2e1eb0fe4cb79244c5f09a7636fe388c236e18c7ecefce85bda9e84ca7b8e796cc3a893f48b0c598d2b96970edb3c7a09e9ed27b7e917e2b52601a961813fbb10ab8b8c297846382ec5005842d38dbcf1d781c2b90dd6ac6a8314c4705b7ec8cc28fe063ec3f4fa46a4cf2d23f5ff49c5fd2971bcdfe6417ca3dd2b99482211710591732cb1a9e54de0771f87f9ba6a2b7b820b533e268e903b462dc06dabd47b557742df4b0d674ea89d2eec49c0e6a4243b5e727171480921650f50044214015176fe25a55214bc490b92a78aeabc877d69507a61fe4431f1e4eae819c85d5d0251cead951020f4329985f5f16f8b74eda1d161417a430606621573b55f48b625cd62cda5d1aba2732d0b65b178345f518522046947876648a62a70d3a5b2dd5a31309e99caba7fcc2c303a89f916743ad77764036e60626b619258fffff99401ea6f7be168bacfd1542c3e071b4660f7ab6ca8493a61f1a1273a4b53b0c820346f9824015837016cf51d6f396b9e8e04e4f185f132a2d6276a06c37847622f434c8a8d87fc0952f2bb1c1b1bfc3a1e5c9ad88f56b0102a3fd6a78fd9992c86fad1c8eff8b5894389703c444c9b66f4daea8d3f034e54bc9c397ad1d1dae5e58386fc34075bb293c37ad10476bcfd59cfde118d9f4031cf04871028ed6f4b421d5ff19a581ebc89db58c6bbb54900ad498b602f7e8a02d08db542bf102ce19d2081134c052bf8367a7a71da045b2605950162b851e2e429a155c852eeee787e09cfde142ce9174e782db951b6da4c38f4ecd954ae77cb2104ba66ffb6dfba9ea03cb5475a1125145274b33437ca4746fd765284f5e4ffb7bd8674e0f407ce274b078f38216e86c1fb488aaa2fdc73fe02c1ee6621eab3119ff1bf99fdb2d7613797d87c914bbfce6cbf78e1fff2504b1d6a0373a569b130539b1c9d5bd70ce6a9e9c451d68edfd52a97197a1c968b0407bc8ad5c6a4200c574ee197c314678ef2e1285133fd95f98bca5c70d11a9fe30ff443dc1a48d85671ee131a26872e03eb430bc236858e1147230e0ae2589ac6c528b230c0e7aef8d0081933678ac556258b6bac3ce6d9ab6dbca28c7ff6d005d87ff384be4d351a9c89cb761d185d777b9327080a669e2d3534fd523cab76f5e7594a4012711b09326315d21913374e8ac2996e65ce6cfdba89af576f4254a740719ef7c29e172c7768e7699380806c135f43f755a08673e4c8ec255929661fad6e0bf880a9d5cf6725b85d4fe1b9ce2f325f8831dc6a803ed02c499313261239affcdcebf2ad2b30fe1778e1f98751368ce5e5dc5f39838480da24b9a238039116910e8b378080fd65e26d2be4b7bf749fe18c2efda68d0175bd1a0361a36b73e3671a84d5d3bd64928dd4b7344ae22f9981cad8249bca118e0a2f1661a58a9dc3d2617346afcee8eeb2e8a40fde95978d18aae5492b38690c4c65cecd7e9f40b2ca6efb91a275e4e88d736664dc538cd5b3fbe071e1f8946d8d41331a722c568c20c7493c35a2b4455debc287ed9355d8f3a35ecffbf761f81fcb1c19c181d9ebf218f8679ff9b2fd48bf8350df742853bea323bbd492a6e843ebc4ba85156e761895da39ca28c9ad1bdb14d2a770ee8b8238e297f74dfc20766f389b1aaebb09860efffcfd6e3aa4d0e2294db2c64eeff656ed1107009fe3334f42293f84c78811dac9db17f609f861ce2b87ca840b204eb27d12f87bc9870f124a9fe3b98162060376e10f467ec10ebbccdac3db034c60f96543a4407cdd748dc70780674d320d26338954ef662e2c660722474f746214a8f0521cda660169ce7f2f13e6522263de4f065682874aa3107a355c70806804fe6c908b2e3f41585e8e0647eb48cfb1ce44b8c753e7a887b4c9611d5d6f614f574cd74d7cc6c35040445d4db3bb0709b48a0dc8cbff7a2b8655e16fe60c45972efed1130cb65589", 0x1000}], 0x7, &(0x7f00000030c0)=[{0x1010, 0x116, 0x7, "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"}, {0x88, 0x1, 0x1, "59c3252c3db3bdfc987e55a6684dd326057dfa85e671cfa43741deae5e928186c538218947f37246067f3ca8dfda3e4956094beb3a8c4e6e0a9181dc61ffc378c094abfa919605d55faad4fdc5d4628e65989a4eb4f9aa6386f48f33642d0db72479991543d60307d63083b9d75c95674d7833d9f3"}], 0x1098, 0x40}, 0x38) r8 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'caif0\x00', 0x1}) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:59:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)={0x1c, r4, 0x1, 0x0, 0x0, {0x2}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x80, r4, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_batadv\x00'}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x1}}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x4}}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'team_slave_1\x00'}, @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'netpci0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8}, 0x44880) r5 = dup(r0) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$CHAR_RAW_SECDISCARD(r5, 0x127d, &(0x7f00000000c0)=0x9) mkdir(&(0x7f00000002c0)='./file0\x00', 0x78) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x8800}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranc=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800ffffff85000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:26 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x3f000000}}) 07:59:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x1000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:26 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1564.654557][T23522] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1564.690484][T23522] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800ffffff9c000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trand=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1564.768594][T23522] Error parsing options; rc = [-22] 07:59:27 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x0, 0x3f00}}) 07:59:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trang=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1564.804701][T23540] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1564.831407][T23540] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1564.898055][T23540] Error parsing options; rc = [-22] 07:59:27 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101, 0x0) recvfrom$llc(r3, &(0x7f00000001c0)=""/253, 0xfd, 0x2121, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800ffffff9f000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x11000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:27 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x0, 0x3f000000}}) 07:59:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x22a00, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netdevsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000000}, 0x80) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300)='/dev/input/mice\x00', 0x40000) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x3f7, 0x300, 0x70bd26, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x40894}, 0x4010) r3 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x258a, 0x6a88, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_disconnect(r3) syz_usb_control_io(r3, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000004c0)={'vlan1\x00', {0x2, 0x4e23, @loopback}}) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000480)=0x3) syz_usb_ep_write(r3, 0x81, 0x24, &(0x7f0000000440)="65fb3a312a124b9af61209c46466e635d8853829a6ea769092c4bc6c1ea6db1cae7bb82d") pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranh=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trani=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x3f000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000003b4000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:27 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x88000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000fa000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1565.775368][T23564] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1565.788555][T23564] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1565.821477][T23564] Error parsing options; rc = [-22] 07:59:28 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES64=r3], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranl=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:28 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}) 07:59:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000ff000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:28 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}) 07:59:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18005ffabfff000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x1100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trano=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000080ffff000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranp=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x3f00000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranq=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:29 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x9, 0x0, 0x10000}}) 07:59:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180085ffffff000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x8800000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:29 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(0xffffffffffffffff) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={r7, @broadcast, @multicast2}, 0xc) r8 = dup(r5) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0xffffffffffff75e8) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trant=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:29 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'rose0\x00', {}, 0x8}) 07:59:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0xffffffff00000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18009cffffff000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18009fffffff000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranu=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000040)=0x1) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x11}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000001000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranw=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000010000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000020000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:30 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$can_raw(0x1d, 0x3, 0x1) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r9 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:30 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$nfc_llcp(r2, &(0x7f0000000040)={0x27, 0x0, 0x1, 0x3, 0x1, 0x8, "69281e5835cdc215d02d56f11000799f6b9aab8caf1fc026a9ae0f3d8081d61f38c7ca980f0161d4597267060e83dd6b6886baa750b4afeb83766fb6651d98", 0x13}, 0x60) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x88}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranx=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000030000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tranz=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x1100}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800ffffc90000e130000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans\bfd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:30 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x1, 0x0, 0x3, 0x2}}) 07:59:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x3f00}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000040000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans%fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:31 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$HIDIOCGRDESC(r7, 0x90044802, &(0x7f0000000300)={0x7ed, "1b84223238d009c1f3fbdb83474d3336f4349268e15b1dc02b5b03ce2080bd676958a04c94049e671e95e50cb4fa411917178a2c1af2f2ebc6197fa2db047c5b686781b7dcecff6563de34c3afea50cfb3920f484d53054597111a88b444d499b090caf9550a243fa69dd998e21dd1a4ccaadbbf7e7969c67e26497414db88341ebea24f1e3c030b9bfaddae8aefb801a466ebfb77181b7d75e64808d89a07efa8c72076dd9c404063acb27ae18724b1a8bded2fea0ae75fdf5f5408a9665cfdc67e95459d018996ef62173475928f5f94bedcebe46ff1e3af8c4698ccb91b11fc1cb9522b5a2a8298726c8505ae7e300eaea09558ed6298fa102868cb4ee444e921e0a4dd0b4f89001f93afed956ccf0577f296acc3b1e4f058315e869993ee67df3b33d9d0012d808837bfc404c72c1481faf1bcb7d52249b3f4ae3c5029aafe7c0c6171e857855bbd7b182d2e1d5897354cdbfaacdb2136b0f2f20c72ac72baaf3569bd963cd8bebb9d54f7ac6fa766be6eed6981dba308f67165c33f7d104aeb5c4e75817c0c20c6e66b0898781c774d986ec020876c43403c50313eb27dc8abf2a39350c624b3d082e500e6042dfe1b57c18a7466e581c87398dd349e8e84d2a64a6826f7917acd8e2aa722b5bbcc68da036b3225ee49679b3f50f8a6d00f01dfe0aedc6f2b5b9bb500dd880fea1f2480a2bc3a743796ed8cad84973f46642752365528a49b7d9072b5b1c0c79f4891fce9d06de107b4dd84c35ba59233bee3586195afe1057b56652b79b291d5c14f900e3cb647780ad8616b629333afa04fbda11175844d69ee39657dce533ab04121eb85446aebac195b04d2f1af38ddba6885ac046dce1c11343a403fa8a1a64c1817c5da566834c189bed5b414d8ff060a03f208e8fa39ee02266005599528d5177640686d4226a069c17084f3e184f904755bbf86ea4a7803ec3b820d660fd8f340f698965d35ce583729d47fb5bdc814acccaeb30d825a6156b5aed96a38609125c3d1ed76b7c441a3063057d4796eb7f93f6f3dc0e92716252f08fa4a36fafd57f8ca5ae411a3a38d9be577b8b1409a5e3efd7bd8e349686e34a948e70352573c413d8884fad2981b1c0dbd8d1dddd79aea5a04d169cc11fa56eb0527f19bcf3cd187929192c1ef31e494c48df17aa2bb696638e0ea765d661ae0c4415e41e5168f740d7f5d925705b461123d5b91e6fff7d5cd6b0b40c849993fc0b5afcf5114495ee85e274e6fbbd4d42e1081e180f2e8c607d7f16c814ec29ce1285afaf8c7bac72b32ad2d9d3f778aaf58113436895e98edc800a1b896f08ddd8b16d0d4ff2136e0bc9b3d6b0f5ee7f4c7164541b0d733715419d3224fe4987ce6732cb67e2da852bc03f4c0249633bf245595ae06a640de0e3d9e304a3b7f4cce2112dd781ac7db810025774763e286c3f5299e90a8beee0db59488a474a01276d3080225d2a5e2fca057e146a2d337cdb9aa9cbf6338ce025189fd403dd2c989f6f8e042cc0f484d38050c61f3fcbb1429d17b7d1940b2ee2d47c2cdbaf47ee4b2721c5ff6dd9ecfcd7724e2fd59262869b1773a3e330f8b0fd04709c57b005acf587ab66dd8dc82488f0423ee2c727f990831e6c32b6464b48c79e86e65a9f05f11f0bca92f3f12af52d7e3e2f64c8278179c0a3c3f149421e7931a0dcac4609a3320bccdc9839ae15ba68b88a0c5ba467e5681038f05fccdd077ac4f06899a142e5d078a2e9ba516a391f704f8717bed7e2fa88616a28baa061b2029f0c8e8f96c0bee6e148304aea660a0cf2f60d0c725873837a1b226f90311b2c97148969be86a94293e1c23db0eccb279f455cf3ee8b5ced386b2655701ae96f57c3d702d4acf609150af86c7932c037094a642f8aef220b20acf31744e2a3b6aee47f20f262874487325c391d1d55eb232ac30254dd15b5c71b5821836e5598c46402a7ac1eeb878c6b80a5da8eb641782091e38a6f2641071a9464e5a895a0ef453641a6844026d56bcf625a4be5e7d32f39b6a02cc5923e2102a890db9f1c4a638aac35d2e2b7f49be722678ec477c200820f1803217919b358edaaaa440cb4956758a97929fdfebed2d4b3d8b4b807d160a7c952145ce92058c1197f15393e621cc76e545e970b2494fb9474592aad948da1c2ff66a865cdd83a6673d502dacbb76a19c24a86e175e4e6365126f9abe395fdbdd9842c89b9235f6fd5eb04af5dac9fbf467e3762642b55a172644cab4a09305dc5176a06f5fec24f7dd6883bd63c754d5260de78d8bd056ec968e1df0b13c1cadb7d1333680db581a754afec4a880392772a4003e6e56dafa7c882cc314f9d5168152f146c909945ae92936e00c001718e9bf7459bee24b5abc7c57ca097c3596e65e432044ea3ee8717853fb16a60d8761c337c1b1dda1adf0b74aebcfa15c3a986c5f8fd4ce426e82b1c37d7ad7786b37a0ef6d1d7e1edece936c3dc9ef7dbb7e55cb4450a2b9c526f9b12a6d761b6c51ca750da4b4dfe97bd449e06899e412ef822885466a374c62535d6e39e20d3cebc3330af6bfde4cf3c6f1f36601f5f71d273874142c1fdb11617623584e8e39e423706441a8d888f563a9bc71c7482b9dedf919b1edbc75385034939c990011cac08b24740e928498ac98e38d2aeddc0d5dae9ab485d3689e60ff66874c248642e10f4f5a5ce924cdee3e5494e768eef6462ab2a4c657889071046a334144a47712a2a0cc919dc15e5abedd2204ae0a389bca448a33307596266a9ebc18a35e0a2ed169e3d6bb134623abff2c3bf3dee2bd34ec44ca1487077cfd8a154a634af31033179932772ed29934cd9cb27e6bd0481199b46cd8a739dd87"}) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000060000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x8800}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:31 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$CHAR_RAW_IOMIN(r3, 0x1278, &(0x7f0000000080)) r4 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000100)) 07:59:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=%d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000080000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x1000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=.d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1569.428032][T23736] 9pnet: Could not find request transport: %d [ 1569.450070][T23738] 9pnet: Could not find request transport: %d 07:59:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000ffff80000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x11000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:31 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x12000, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0xfffffffffffffdeb) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x7, 0x7, 0x1, 0x0, 0x0, 0xb}}) 07:59:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=/d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1569.562495][T23746] 9pnet: Could not find request transport: .d [ 1569.577967][T23748] 9pnet: Could not find request transport: .d [ 1569.687034][T23759] 9pnet: Could not find request transport: /d [ 1569.727233][T23761] 9pnet: Could not find request transport: /d 07:59:32 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x2c8, r3, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x18000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f1}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x12c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff01}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x41, @remote, 0x8000}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf88a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x101, @dev={0xfe, 0x80, [], 0x3e}, 0xf38d}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3c2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd1e0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_MEDIA={0x74, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x91b}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x8c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0xf}, 0xb6af}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x64010102}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x9, @rand_addr=' \x01\x00', 0x200}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}]}, @TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'vlan0\x00'}}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x332}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x80d0}, 0x8000) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000a0000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x3f000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=\\d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:32 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x6) 07:59:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000010000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1570.244301][T23772] 9pnet: Could not find request transport: \d [ 1570.270005][T23777] 9pnet: Could not find request transport: \d 07:59:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=f\a,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x88000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000020000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=f%,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1570.396433][T23782] 9pnet: Could not find request transport: f [ 1570.419107][T23787] 9pnet: Could not find request transport: f 07:59:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000030000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1570.537545][T23793] 9pnet: Could not find request transport: f% [ 1570.562674][T23798] 9pnet: Could not find request transport: f% 07:59:33 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x47a, 0x1, 0x200}) 07:59:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000040000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fA,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x1100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fD,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1571.108859][T23806] 9pnet: Could not find request transport: fA [ 1571.130924][T23811] 9pnet: Could not find request transport: fA 07:59:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000050000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x3f00000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fI,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1571.261705][T23816] 9pnet: Could not find request transport: fD [ 1571.274721][T23819] 9pnet: Could not find request transport: fD 07:59:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000060000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x8800000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fQ,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1571.393446][T23825] 9pnet: Could not find request transport: fI [ 1571.409164][T23828] 9pnet: Could not find request transport: fI 07:59:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000070000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1571.523399][T23835] 9pnet: Could not find request transport: fQ [ 1571.550069][T23839] 9pnet: Could not find request transport: fQ 07:59:34 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400002386f99f00020073797a300000000005000500000000000500ad00060013001c0007800600044020000000060005400000100008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0xffffffff00000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000100)={{0x1, 0x0, 0x80, {0xf000, 0x10000}}, "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", "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"}) r1 = syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0xbc, r1, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4c, 0x8, 0x0, 0x1, [{0x4}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x220c5d25}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15b1ec1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdbddab8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe847df9}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x40, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5986b8b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x8, 0xc, 0x0, 0x1, [{0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0x4}, {0x4}, {0x4}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x48840}, 0x4000000) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002180)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x20020080) 07:59:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fR,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000080000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1571.964963][T23849] 9pnet: Could not find request transport: fR [ 1571.984156][T23854] 9pnet: Could not find request transport: fR 07:59:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fS,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000090000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x11}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1572.051295][T23857] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 07:59:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000a0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1572.117602][T23862] 9pnet: Could not find request transport: fS [ 1572.134933][T23866] 9pnet: Could not find request transport: fS 07:59:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fT,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x88}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000b0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1572.254186][T23872] 9pnet: Could not find request transport: fT [ 1572.290328][T23876] 9pnet: Could not find request transport: fT 07:59:34 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fV,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x1100}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000c0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffb}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) r5 = openat$cgroup_type(r4, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000002700)=ANY=[@ANYBLOB="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"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getpid() r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r10, 0x0) sendmsg$netlink(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r10}}}, @rights={{0x28, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, r9}}}], 0x78}, 0x0) keyctl$chown(0x4, 0x0, r6, r10) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000100)=""/130) setsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000080), 0x4) [ 1572.866897][T23888] 9pnet: Could not find request transport: fV [ 1572.884571][T23894] 9pnet: Could not find request transport: fV 07:59:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000d0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x3f00}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fX,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c0000046d00050700000000000000b7c0000000", @ANYRES32=r4, @ANYBLOB="00000000000000002c0034801400360064756d6d7930000000000000000000001400350069703667726530000000000000000000"], 0x4c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc042142}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="3216d91949ca196d00010801000200"], 0x18}}, 0x40000) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000e0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1573.029146][T23903] 9pnet: Could not find request transport: fX [ 1573.047795][T23907] 9pnet: Could not find request transport: fX 07:59:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x8800}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=f\\,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1573.157498][T23914] 9pnet: Could not find request transport: f\ 07:59:35 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$eventfd(r7, &(0x7f00000000c0)=0x1ff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fb,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x1000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e22, @local}, 0x112, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)='vcan0\x00', 0x8, 0x0, 0x5}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r6 = dup2(r0, r1) pread64(r6, &(0x7f0000000040)=""/9, 0x9, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2004000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@mpls_delroute={0xb4, 0x19, 0x800, 0x70bd29, 0x25dfdbfe, {0x1c, 0x10, 0x20, 0xdf, 0xfe, 0x4, 0xc8, 0x7, 0x800}, [@RTA_MULTIPATH={0xc, 0x9, {0x6, 0x1, 0x0, r4}}, @RTA_OIF={0x8, 0x4, r4}, @RTA_NEWDST={0x84, 0x13, [{0x9}, {0x7}, {0xbcf}, {0x1}, {0x9, 0x0, 0x1}, {0x55dec, 0x0, 0x1}, {0xffffe}, {0x6, 0x0, 0x1}, {0xffffa, 0x0, 0x1}, {0x80}, {0xe55}, {}, {0x800}, {0x1}, {0x1, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x587b}, {0x8}, {0x5}, {0x8, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x2}, {0x1f, 0x0, 0x1}, {0xfff}, {0x1, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0xf9}, {0x3ff}, {0x1ff, 0x0, 0x1}, {0xf3, 0x0, 0x1}, {0x289, 0x0, 0x1}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000880) 07:59:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000f0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x2028000, &(0x7f0000000040)='$') pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000100)={0x8, 0x7747, 0x4, 0x10, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000140)={r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 1573.749499][T23927] 9pnet: Could not find request transport: fb [ 1573.778961][T23935] 9pnet: Could not find request transport: fb 07:59:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000100000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fc,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x11000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x190) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@private2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000000)=0xe8) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x0, 0x7fffffff}}) 07:59:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000110000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1573.943156][T23944] 9pnet: Could not find request transport: fc [ 1573.970600][T23950] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1574.016149][T23950] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1574.086717][T23950] Error parsing options; rc = [-22] 07:59:36 executing program 4: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x14, r3, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x12c, r3, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x42}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xb1f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9daa}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x1}}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9236}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}]}, 0x12c}}, 0x800) 07:59:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fg,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x3f000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000120000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000100)={'dummy0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2d}}}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0xa00, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x8, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3c}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r4, 0x4, "76e887", "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"}}, 0x110) 07:59:36 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYRES64=r2], 0x1}}, 0x20048001) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fi,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1574.591770][T23965] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1574.601939][T23964] 9pnet: Could not find request transport: fg [ 1574.616742][T23971] 9pnet: Could not find request transport: fg [ 1574.626027][T23965] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x88000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000180000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x5, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1574.679545][T23965] Error parsing options; rc = [-22] [ 1574.701969][T23965] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1574.721928][T23980] 9pnet: Could not find request transport: fi [ 1574.730608][T23965] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fk,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1574.749352][T23986] 9pnet: Could not find request transport: fi 07:59:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = socket$netlink(0x10, 0x3, 0x12) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000500)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_SET_LIMITS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x1c}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x44800}, 0x8010) [ 1574.783338][T23965] Error parsing options; rc = [-22] 07:59:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000001f0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000100)={0x9, 0x3, 0x1, 0x0, r1}) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, 0x5, 0x2, 0x10, &(0x7f0000ffd000/0x3000)=nil, 0x7e}) 07:59:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fl,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1574.898838][T23999] 9pnet: Could not find request transport: fk [ 1574.908515][T24000] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x1100000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1574.952377][T24000] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1575.000414][T24008] 9pnet: Could not find request transport: fl [ 1575.010086][T24000] Error parsing options; rc = [-22] [ 1575.020817][T24012] 9pnet: Could not find request transport: fl [ 1575.034743][T24000] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1575.062419][T24000] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1575.076097][T24000] Error parsing options; rc = [-22] 07:59:37 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000200000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) vmsplice(r4, &(0x7f0000001300)=[{&(0x7f0000000080)="d7a25d7f9607d826529ecfb9a070f2714c78ff9f4a0981f607d6b5dc64e23b63f1bf9db378ca83838db4a4b3abd730", 0x2f}, {&(0x7f0000000200)="7157e5a86bc30fc3806253cee7de5c61573f414ebf28166fc702bfeac587a411833d71e607b8db88853b774bed547dac1b4ad016ae513e16c4501c4ccc5dc3", 0x3f}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="10d90b8e4db8a52a11a2892702de05b0f5396d805062b5667f3b43babaa1", 0x1e}, {&(0x7f0000001280)="97ea72b3306ae0ebb48bb8c4083405f6", 0x10}, {&(0x7f00000012c0)="084073bd588214610a2b8fe4db47a5826e5b4c2130cc15085f45d453a65e", 0x1e}], 0x6, 0x5) r5 = getuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$EBT_SO_SET_COUNTERS(r9, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000040)=[{}, {}], 0x0, [{}, {}, {}]}, 0xa8) setresuid(r2, r5, r7) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fo,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x3f00000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x204880, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000140)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='jffs2\x00', 0x900840, &(0x7f0000000040)='$') 07:59:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fp,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1575.506539][T24024] 9pnet: Could not find request transport: fo [ 1575.525503][T24030] 9pnet: Could not find request transport: fo 07:59:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000003200000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0x8800000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair(0x3, 0x6, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) accept$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) connect$can_j1939(r3, &(0x7f0000000240)={0x1d, r6, 0x1, {0x2, 0x1, 0x1}}, 0x18) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockname$packet(r8, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) recvfrom$unix(r2, &(0x7f0000000040)=""/21, 0x15, 0x10161, 0x0, 0x0) 07:59:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x94) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) statx(r4, &(0x7f00000001c0)='./file0\x00', 0x6800, 0x400, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = getpid() r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r9, 0x0) sendmsg$netlink(r6, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r9}}}], 0x20}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffcbc) setresuid(0x0, r11, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x200808, &(0x7f0000000480)=ANY=[@ANYBLOB="66643dd5ef5dc40c6dad47eb01e759011a1b27718c421786f60cf9be702912992ca8f9e23f6bb7f716209a4e184400"/56, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r9, @ANYBLOB=',max_read=0x0000000000000009,max_read=0x0000000000000001,default_permissions,fsname=$,dont_measure,uid<', @ANYRESDEC=r11, @ANYBLOB="2c6f626a5f726f6c653d247bd52a2e282c00"]) 07:59:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fq,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1575.657255][T24036] 9pnet: Could not find request transport: fp [ 1575.673871][T24042] 9pnet: Could not find request transport: fp [ 1575.739696][T24048] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1575.772337][T24048] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1575.784442][T24052] 9pnet: Could not find request transport: fq [ 1575.788779][T24051] fuse: Bad value for 'fd' [ 1575.807095][T24048] Error parsing options; rc = [-22] [ 1575.826171][T24048] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1575.845568][T24048] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1575.860704][T24048] Error parsing options; rc = [-22] 07:59:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x0, 0x0, 0xffffffff00000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000240000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:38 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x180}}) 07:59:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fs,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x404000, 0x0) setsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000140)=0x1, 0x4) setresuid(0x0, r0, 0x0) quotactl(0x8552, &(0x7f00000000c0)='\x00', r0, &(0x7f0000000280)="3c9b0de9eebe505453b0b1d026da60be35e082b38ca8f9738a02dd09beb7f0d8b4b38b7dad350715e0bc7c10ab5aeea9c4de96ba7c41bbb1d0d27de41f75d0dc3444f341061c3b65703575ae6a1877e0370c62f83b995c40c1a11e45f32aada2b671fb40b951782e54d8c6bc17752f95af84c2c2a1df5e7a7a076336d2dba5b9db8b071492421276a7ec29311bf307001cc0dfc6") mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') r2 = pidfd_getfd(r1, r1, 0x0) sendmsg$netlink(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000240)=[{&(0x7f0000000340)={0x10, 0x25, 0x20, 0x70bd2d, 0x25dfdbfc}, 0x10}], 0x1, 0x0, 0x0, 0x8000}, 0x80) 07:59:38 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = getpid() r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r6, 0x0) sendmsg$netlink(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, r6}}}], 0x20}, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0xa0, 0x0, 0x1, {{0x0, 0x3, 0x7, 0x15, 0x10000, 0x1, {0x2, 0x16b, 0x4fac, 0x200, 0x5, 0x1, 0x9, 0x401, 0xffff, 0x4, 0x1, 0x0, r6, 0xfff, 0x7}}}}, 0xa0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES32=r8], 0x1}, 0x1, 0x0, 0x0, 0x4000004}, 0x80) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1576.411150][T24066] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1576.429084][T24067] 9pnet: Could not find request transport: fs 07:59:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000250000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fu,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:38 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1576.456001][T24066] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1576.511914][T24066] Error parsing options; rc = [-22] 07:59:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000002c0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1576.551794][T24079] 9pnet: Could not find request transport: fu [ 1576.568514][T24085] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1576.568562][T24086] 9pnet: Could not find request transport: fu 07:59:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fw,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:38 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) read$snddsp(r2, &(0x7f0000000040)=""/45, 0x2d) 07:59:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @timestamp, @window={0x3, 0x3f, 0xfffe}, @window={0x3, 0x20, 0x81}, @timestamp, @mss={0x2, 0x20}], 0x6) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[@ANYRES16=r2, @ANYRES64=r8, @ANYRESDEC=r6, @ANYRESHEX=0x0, @ANYRES16=r1, @ANYRESOCT=r6, @ANYRESDEC=r3], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 07:59:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x11}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1576.618502][T24085] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fx,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1576.696714][T24094] 9pnet: Could not find request transport: fw [ 1576.702714][T24085] Error parsing options; rc = [-22] [ 1576.712003][T24099] 9pnet: Could not find request transport: fw 07:59:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000003360000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x88}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fdWrfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1576.774836][T24104] 9pnet: Could not find request transport: fx 07:59:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000003c0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x1100}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,%fdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1576.892493][T24114] 9pnet: Could not find request transport: fdWrfdno=0x0000000000000003 [ 1576.919374][T24116] 9pnet: Could not find request transport: fdWrfdno=0x0000000000000003 07:59:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000003f0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000002c0)={'veth0_macvtap\x00', 0x40}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/169) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$vim2m_VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000200)={0x2, 0x3, 0x4, 0x0, 0x10000, {r5, r6/1000+10000}, {0x4, 0x2, 0x3, 0x5, 0x1, 0x81, "0d191b9d"}, 0x9, 0x1, @userptr=0x20, 0x40, 0x0, r8}) r9 = dup(r2) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat$cgroup(r9, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x3, 0x200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') [ 1577.040065][T24123] 9pnet: Insufficient options for proto=fd [ 1577.082365][T24131] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1577.102199][T24131] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1577.122381][T24131] Error parsing options; rc = [-22] 07:59:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x3, 0x6, 0x3, 0xc0}}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x3f00}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,\\fdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000400000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x420380, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) 07:59:39 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000000c0)) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000104400000000006000540000000000800064000"/96], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:39 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x2) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x8, 0x100, 0x2}}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x16) 07:59:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f00000001c0)={0x60, 0x480, 0x226, 0x600, 0x5, 0x40, 0x18, 0x1, {0x8e, 0xfff}, {0xa356, 0x800, 0x1}, {0x4, 0xfffffff8, 0x1}, {0x2, 0x0, 0x1}, 0x2, 0x100, 0x1, 0x3, 0x1, 0x4, 0xb0000000, 0x8000, 0x2, 0x5, 0x41490000, 0x4, 0x20, 0x0, 0x0, 0x7}) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) 07:59:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,r%dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1577.612131][T24143] 9pnet: Insufficient options for proto=fd [ 1577.635197][T24151] 9pnet: Insufficient options for proto=fd 07:59:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x8800}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000002400000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1577.696166][T24154] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1577.751782][T24160] 9pnet: Insufficient options for proto=fd [ 1577.761239][T24162] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1577.772684][T24167] 9pnet: Insufficient options for proto=fd 07:59:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,r.dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x1000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000480000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1577.799868][T24162] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:40 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f0000000100)=0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) setsockopt(r2, 0x3, 0x0, &(0x7f0000000080)="db9441f3eefca65a0bbff53e97bd61b6e2870dc616806360812508", 0x1b) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 07:59:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x11000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1577.887822][T24162] Error parsing options; rc = [-22] [ 1577.903123][T24173] 9pnet: Insufficient options for proto=fd [ 1577.917998][T24178] 9pnet: Insufficient options for proto=fd [ 1577.925333][T24162] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,r/dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1577.951727][T24162] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1578.015990][T24162] Error parsing options; rc = [-22] [ 1578.037996][T24188] 9pnet: Insufficient options for proto=fd 07:59:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x0}) fsetxattr(r1, &(0x7f0000000040)=@random={'system.', '/dev/uinput\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x1) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000004c0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,r\\dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xd}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x4}}]}, 0x34}}, 0x0) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000002840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002800)={&(0x7f0000001740)=@newtaction={0x10b0, 0x30, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{0x109c, 0x1, [@m_ipt={0x1098, 0x11, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x70, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0xde}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TARG={0x2e, 0x6, {0x40, 'raw\x00', 0x7b, 0x1, "b9372ade"}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0x10b0}, 0x1, 0x0, 0x0, 0x4081}, 0x4000004) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x1000, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_STREAMON(r8, 0x40045612, &(0x7f00000000c0)=0x5) 07:59:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x3f000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000520000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:40 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mq_getsetattr(r2, &(0x7f0000000080)={0x2, 0x5, 0xd81, 0x9}, &(0x7f0000000100)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x21, {0x0, 0x0, 0x0, 0x0, 0xac6, 0x40}}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000001c0)={0x2, 0x7f, 0x1, 'queue0\x00', 0xffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1) 07:59:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rf\ano=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1578.501416][T24201] 9pnet: Insufficient options for proto=fd [ 1578.502748][T24200] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1578.528763][T24207] 9pnet: Insufficient options for proto=fd 07:59:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x88000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:40 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)=0xffffffff, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a30000000000500050000000000050001060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="1200000007020009003a865d3a2e29b25b27435f19a727b4db49b3251d8a2d6131bdb07bd34616fb3f9673d1f37b07eb3afb478e9c621401bc83319f4720773fa40947b681b252807a32371f7541bac6b845aa9ff790e13efe27e121e3b7eab19cfc5b8cd9b49cc063b023b41a40f95335aaccd3684a7d61d79c363ff8de423706cf1f0ca9aef9ba79b7a5229b9de7526213d62a493b8c20af20d75ddf09edc7c5c1617b0eecaac13715a691e6c6b454b8b15e0e013a17adf3cc7c4fea82109c8200be51e94a747ece558d447f1a6fd14ac6da559b6c8c107856242c0cb05adbb9a822e357c63a26ff8237398203218efe181a51abf50d45f96506f88bc9c4462b882f2e15c9235c31bd95dc3116246081e835399357d0e4b88da01c0f73131c541cb903c02339fd95e9e42364cc6ab91deab4a0a960052f71c698867e502a9d98a6b1561d3fcbbe3aa0835ac601d0eedc6d455e2a95acdfabc6e19878b2b67ca458c7891eb70600000000000000476cc88f45f6d3e41829b51aee13535423f5226d1ef0e17c6c8861d174e8078b61da90c4da00"/417], 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KVM_ARM_SET_DEVICE_ADDR(r8, 0x4010aeab, &(0x7f0000000100)={0x200, 0x1}) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 1578.628913][T24209] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1578.659616][T24222] 9pnet: Insufficient options for proto=fd 07:59:40 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x7fff, {0x0, 0xb5, 0x0, 0x0, 0x100, 0x2}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40a81, 0x0) 07:59:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000680000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rf%no=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1578.697630][T24225] 9pnet: Insufficient options for proto=fd 07:59:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200241, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r4, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x20040080) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000006c0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:41 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0x9c0000, 0x2, 0xffffffc0, r4, 0x0, &(0x7f0000000040)={0x9b0909, 0x4, [], @value=0x7fffffff}}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfAno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1578.790135][T24237] 9pnet: Insufficient options for proto=fd [ 1578.814106][T24239] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1578.830898][T24241] 9pnet: Insufficient options for proto=fd [ 1578.878194][T24243] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1578.901855][T24243] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000740000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x11}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfDno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1578.970555][T24243] Error parsing options; rc = [-22] [ 1578.985430][T24253] 9pnet: Insufficient options for proto=fd [ 1578.999441][T24256] 9pnet: Insufficient options for proto=fd [ 1579.046567][T24259] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1579.054135][T24259] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1579.078461][T24259] Error parsing options; rc = [-22] [ 1579.095025][T24264] 9pnet: Insufficient options for proto=fd 07:59:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="1800009a4c65a0f0b4afe5150553b1e36044b480917303d1b5b18adaeb2825b5f23208b2a5e5f5a47d876242d093d7c92ef1882794385f14d451938ab030ae9fa57f1c8402249a0b110bdb06b0413628ef3b051f525ddb0239be52052922697033e343cee453f86081", @ANYRES16=r4, @ANYBLOB="000529bd7000fcdbdf250a000000080031000600000008003b0006000000"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000890) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f00000001c0)={0x10, 0x49, {0x56, 0x2, 0x3, {0xd87b, 0xad7}, {0x57, 0x1}, @cond=[{0xc00, 0x4, 0x400, 0x7, 0x0, 0x200}, {0x8, 0x6, 0x2, 0x401, 0x401, 0x200}]}, {0x0, 0xf7, 0xfff, {0x85, 0x5}, {0x81, 0x18}, @cond=[{0x3, 0x3, 0x6, 0xe708, 0x81, 0x7}, {0x2, 0xd1, 0x5, 0x3, 0x200, 0x5}]}}) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000100)={0x400, 0x7528, [0x3f, 0x1000, 0x30ff, 0x8, 0x5], 0x9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$EVIOCSABS20(r6, 0x401845e0, &(0x7f00000000c0)={0x200, 0x3, 0x80000001, 0x10000, 0x80, 0x1}) 07:59:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000008fa750000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfIno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x88}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:41 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ftruncate(r3, 0x7fff) close(r2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = dup(0xffffffffffffffff) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) poll(&(0x7f0000000240)=[{0xffffffffffffffff, 0xe142}, {r7, 0x540}, {r4, 0x2}, {r10, 0x12}, {}, {0xffffffffffffffff, 0x53ebbcaab59737cf}, {0xffffffffffffffff, 0x10}, {r9, 0x402}, {0xffffffffffffffff, 0x110}], 0x9, 0x132c) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1579.663194][T24275] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1579.687958][T24276] 9pnet: Insufficient options for proto=fd 07:59:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000007a0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfQno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1579.703751][T24275] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1579.720070][T24280] 9pnet: Insufficient options for proto=fd 07:59:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x1100}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000ffffff850000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1579.797711][T24275] Error parsing options; rc = [-22] [ 1579.816035][T24275] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1579.840758][T24291] 9pnet: Insufficient options for proto=fd 07:59:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfRno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x3f00}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1579.849341][T24275] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1579.869700][T24296] 9pnet: Insufficient options for proto=fd 07:59:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfSno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1579.948029][T24275] Error parsing options; rc = [-22] [ 1579.959414][T24300] 9pnet: Insufficient options for proto=fd 07:59:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000100)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xc000, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x100001, &(0x7f0000000040)='$') 07:59:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000ffffff9c0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x8800}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000ffffff9f0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1580.113219][T24310] 9pnet: Insufficient options for proto=fd [ 1580.137613][T24316] 9pnet: Insufficient options for proto=fd 07:59:42 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r2], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c0000006d00050700"/20, @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000017000000003dc8abfa2353de2d00697036677265300000ee790000000016"], 0x4c}}, 0x0) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)=""/251, 0xfb}, {&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f00000003c0)=""/224, 0xe0}, {&(0x7f00000004c0)=""/177, 0xb1}, {&(0x7f0000000580)=""/19, 0x13}, {&(0x7f00000005c0)=""/15, 0xf}, {&(0x7f0000000600)=""/99, 0x63}, {&(0x7f0000000680)=""/214, 0xd6}], 0x8, &(0x7f0000000800)=""/212, 0xd4}, 0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r10 = accept4$x25(r9, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x0) r11 = fcntl$dupfd(r7, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 07:59:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000003b40000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfTno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x2, 0x8, 0x4, 0x100, 0x3, {r0, r1/1000+10000}, {0x3, 0xc, 0x56, 0x1f, 0x0, 0xf6, "137a32b8"}, 0x5, 0x4, @userptr=0xfffffffffffffff8, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000240)={0xa00000, 0x800, 0x200, r4, 0x0, &(0x7f00000001c0)={0x9a0909, 0x5, [], @ptr=0x57d8}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r8, 0x117, 0x5, 0x0, 0x9) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x1000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000fa0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1580.612381][T24328] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1580.625388][T24330] 9pnet: Insufficient options for proto=fd [ 1580.647842][T24328] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1580.664300][T24336] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1580.672064][T24338] 9pnet: Insufficient options for proto=fd 07:59:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x11000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1580.708758][T24328] Error parsing options; rc = [-22] 07:59:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000ff0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfVno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getpeername(r1, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x80) 07:59:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000005ffabfff0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x3f000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1580.871982][T24350] 9pnet: Insufficient options for proto=fd [ 1580.886508][T24353] 9pnet: Insufficient options for proto=fd [ 1580.908964][T24355] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1580.936874][T24355] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1580.978537][T24355] Error parsing options; rc = [-22] [ 1581.006276][T24355] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1581.028674][T24355] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1581.067278][T24355] Error parsing options; rc = [-22] 07:59:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xe2I\xd9\xc1\xc9\xac#\xf7{\xf4\xed?\x17\x0eR\x00\xf0\x8e\\\x97\x04\x80\xa48\xb7\xc9q\xbbO\xab\xe6\xbe\x00'/46) 07:59:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfXno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000030e10000c9ffff0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x88000000}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1581.494208][T24367] 9pnet: Insufficient options for proto=fd [ 1581.515071][T24371] ecryptfs_parse_options: eCryptfs: unrecognized option [³âIÙÁɬ#÷{ôí?R] [ 1581.521626][T24373] 9pnet: Insufficient options for proto=fd 07:59:43 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102f00000000000000000000000100003006269746d61703a706f72740005000400000000000900020073797a3000000000050005000000000005000100060013001c0007800600044000000000060005400000000008000640"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@ipx, &(0x7f00000001c0)=0x80, 0x80000) recvfrom$netrom(r3, &(0x7f0000000200)=""/182, 0xb6, 0x10103, &(0x7f0000000300)={{0x3, @default, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10080, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = getpid() r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r11, 0x0) sendmsg$netlink(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r9, 0x0, r11}}}], 0x20}, 0x0) ioctl$TUNSETGROUP(r7, 0x400454ce, r11) 07:59:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000ffffffff0000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1581.560323][T24371] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rf\\no=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1581.626979][T24371] Error parsing options; rc = [-22] 07:59:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000020000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1581.688946][T24381] 9pnet: Insufficient options for proto=fd [ 1581.714374][T24385] 9pnet: Insufficient options for proto=fd 07:59:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfbno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x11}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000030000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfcno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1581.821990][T24392] 9pnet: Insufficient options for proto=fd [ 1581.850800][T24395] 9pnet: Insufficient options for proto=fd 07:59:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x88}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x1380409, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f0000000280)) r2 = dup(r0) unlink(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_TRY_ENCODER_CMD(r4, 0xc028564e, &(0x7f0000000100)={0x2, 0x0, [0x1000, 0x101, 0x2, 0x545, 0x70a, 0x9, 0x0, 0xfffffff8]}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f00000000c0)={0x2, r6}) 07:59:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000040000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1581.992322][T24402] 9pnet: Insufficient options for proto=fd [ 1582.012842][T24407] 9pnet: Insufficient options for proto=fd 07:59:44 executing program 2: semget$private(0x0, 0x1, 0x1f2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') r0 = dup(0xffffffffffffffff) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = dup(r2) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f00000017c0)=0x7ff, &(0x7f0000001800)=0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001b40)=ANY=[@ANYBLOB="24feff2cbd7000fedbdf25000000004c670b014f5d85a93d9010c7b946a523624cd1a7fb9e4851e99c36f7c753d40d1d7443cae9cf6809a349937850fb7a11695f477b2c302d9d", @ANYRES32=0x0, @ANYBLOB="1213b00600000000007d3412e8ec81dbccaa04f64a011e904e1a168ef7ffffffffffffff23de7c362cf8da0d1fd8678930d196af0008ffffffff07ea0000d74c6a8c6a05551382ce4770716b9aa2ec65d07f0449d8d4bfee0232020093113c95d082f5c122a94959f455aa82a91bcedccc75b00b1725a680"], 0x34}, 0x1, 0x0, 0x0, 0x6c94}, 0x20000001) linkat(r3, &(0x7f0000000100)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) r5 = dup(r1) syz_mount_image$minix(&(0x7f0000000200)='minix\x00', &(0x7f0000000240)='./file0\x00', 0x722, 0x6, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0x1000, 0x7}, {&(0x7f0000001280)="fd8a44a53a3709779313ca80827d3216899cdb84b0b14c548f0870c5f785e89f2fc5733eeb0cc60ce442ffe26b11f20fc107a8e7a73ca87c21dee4f44400598d38426c01fc523bd7c1c84b95f940262af1ebef9bc1a100dc45572bbb5803194bf1e8b807d150a42389219c6018f556d5a41d7a043e3ce2512cc445839c5e12f2c5fefba988631d99a4d7d4f51fe327d36f74b79a", 0x94, 0x3}, {&(0x7f0000001340)="5000a48acaa14f815a1d701b3eb0d086e00e57f97a126a7e04ab4b2a65576b228098f7412250d4480a2454ebc3d9beeb77ae130bd86a69592e8f18241308", 0x3e, 0x10000}, {&(0x7f0000001380)="5c7d0807d94fa8f20bcf620eccc6d661034ab9c111fbd569c00e318aecb84144e35d8d2e99695eb202cdfdbb448a9050b812f1bf746eab90f81231ed63868d6d5ce76199085ccd7d13b07fd258311408332195806dcc5085c9fa04a1e2baa8d09ea7afb7c943f7a1e7cfc71cb576c0f56650b7647e01b37639ee2b58e3b9a0e3f89c6bce22d016497fc9705a7b62b8cd8320349f0985964d2ff121c0ae5634109f35f852e6c163a14cd2719a22173fd561512183ec2286a3b6f379c93c7a1f95ce6ea243a9891941fa36749461b5a6a036ff62b9da8f0137de446d31f465c58b0ca2f5", 0xe3, 0x32}, {&(0x7f0000001480)="06bdcd41cfc683e94421cbe751ccdda23d4ca2488ffcf5fc3db6a7e157d4bf56bba52b1baceb26cdaf4a46beab705d22491dbca31ef79405be0943d2d3e976b7556751b99a3fc24020ba7592a9b72eee1e6b295e893542f6791149584e347729f79d1ca4d379efc224fba8d9a8e70ae561c22d51acf98c1a7acab0eae36b5773d45bdc92d1875a18a6f6f388a49e9993b0b201049aa187c1db12157df6bb6b5d6e6c557c67a84db822b1d8870f764e58faaa272b0b6e2dfbabedc795309b0313d0705dddf74772a1cf089f479591d3ca275a59abd75da35c5baeead238af33a0f42e650f318f10a220efe044fd53398edf529e5fa70850", 0xf7, 0xfffffffffffffff9}, {&(0x7f0000001580)="c30799823f904adfd891f08005a49be7c2e9cbbcc8eb5729a082e8f99fdd70af0575adc159e29315a8d5324fe53157784a205df4ad76ca5b41", 0x39, 0x2}], 0x400, 0x0) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_PCM_IOCTL_START(r5, 0x4142, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000001680)=""/222, &(0x7f0000001780)=0xde) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) fanotify_mark(r0, 0x54, 0x28, r5, &(0x7f00000000c0)='./file0\x00') 07:59:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfgno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000050000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1582.555653][T24418] 9pnet: Insufficient options for proto=fd [ 1582.557994][T24417] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1582.583741][T24422] 9pnet: Insufficient options for proto=fd [ 1582.592752][T24417] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfino=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000060000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1582.666629][T24417] Error parsing options; rc = [-22] 07:59:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x11}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfkno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000070000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1582.692632][T24425] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1582.707127][T24429] 9pnet: Insufficient options for proto=fd [ 1582.708328][T24425] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1582.724279][T24431] 9pnet: Insufficient options for proto=fd [ 1582.806668][T24425] Error parsing options; rc = [-22] 07:59:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x88}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000080000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rflno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1582.833422][T24439] 9pnet: Insufficient options for proto=fd [ 1582.854291][T24442] 9pnet: Insufficient options for proto=fd 07:59:45 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="01000000000000c46785d5000000"], 0x14}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00000000f3bff1706828238e57ee4791ff2cf470b03360bfa8eea9723d456b10671f62", @ANYRES16=r4, @ANYBLOB="040028bd7000fddbdf250100000008000500010000003400028006000e004e20000006000f000600000008000900ee000000060002004e24000006000b000a00000005000d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x4000025}, 0x84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000100)=0x100) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000002060102efffffffffffffff01000000100003006269746d61703a706f7274000500040000e5ff08090002050080060004400000000006000540000000000800064055b8ff79ff4b200b5c61d875b5"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$dsp(r1, &(0x7f00000001c0)="6e0f7cc563a73648d1c16ea7acc12b4ed8c112f818ad456dcb9a5d1cebd11addb8d1a222aa6761879408f3fb03f8fedde73c25ffb812fd40ef93148e817070ccff10641b8305fbaac6d4ee38bfb434578f1746e4be3cd1f5956ece25e9900cf926017c130d6ed6b02684abaa3f6057d0af55892e7a84e1f3560f8a990d814743ffeebc959be711e162395aeea7bfb775f9d3c2a4c1ff42a5ee1f379de46e02e31fb079020d8d286dade95717542a4295bc05bfa1cf3fdbe61ffbb43a757018b5534445c41b025dbe02aa45cca53362a61538c720821ecd635e6ec586b8a57e787d6e1e0b9d039405", 0xe8) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000480)={'ip6erspan0\x00', &(0x7f0000000640)=ANY=[@ANYRES32=r3]}) 07:59:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000090000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1582.957819][T24449] 9pnet: Insufficient options for proto=fd [ 1582.973083][T24452] 9pnet: Insufficient options for proto=fd 07:59:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfono=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000780)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000240)='&(:^{@', 0x6, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) io_uring_register$IORING_REGISTER_PROBE(r3, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d5f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/184], 0x15) sendmsg$AUDIT_DEL_RULE(r3, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000700)={&(0x7f00000002c0)={0x438, 0x3f4, 0x0, 0x70bd2c, 0x25dfdbfe, {0x5, 0x2, 0x21, [0x40, 0x9, 0x99b, 0x7, 0x0, 0x4, 0xfffffffe, 0x8, 0x8, 0xffff, 0x80, 0x4, 0xffffffff, 0x7, 0x8, 0x4, 0x1, 0x0, 0xfffffffd, 0x2678, 0xfffffff7, 0x81, 0x5, 0x7f, 0x7, 0xac9, 0x4, 0x1, 0xe1, 0xf8000000, 0xffffffff, 0x4, 0x3ff, 0x9, 0x3f, 0x10000, 0x7f, 0x9, 0x51000, 0xe0c, 0x4, 0x1f, 0xffc5, 0x3, 0x0, 0x20, 0x200, 0x2, 0x2, 0xa4d7, 0x8, 0x800, 0x1, 0x7, 0x62c, 0x9, 0x8001, 0x4, 0x33a, 0x90, 0x1, 0x1, 0x400, 0x1ff], [0x81, 0x3, 0x8, 0x514, 0xe2, 0x0, 0x4, 0x6, 0xffffffff, 0x1, 0xa93, 0x400, 0x800, 0x2d2, 0x5, 0x4090, 0x3, 0x2, 0x3704, 0xd28, 0x54, 0x80000001, 0x6, 0x9, 0x0, 0x81, 0x1, 0x5, 0xdf, 0x7, 0x7, 0x400, 0xe652, 0x6, 0xe2cd, 0x80000000, 0x9, 0xa3e, 0x101, 0x80000001, 0x800, 0x1000, 0x0, 0x400, 0x2, 0x7ff, 0x3, 0x100, 0xf, 0x1, 0x3, 0xde03, 0xa39, 0x1800, 0x80, 0x2, 0x48000000, 0x3ff, 0x4, 0x6, 0x9, 0xf8000000, 0xa66, 0xff], [0x0, 0x2, 0x1, 0x918, 0x1, 0x1, 0xffffffe0, 0x1000, 0x9, 0x7ff, 0x6, 0xfffffeff, 0xffff, 0x7f, 0x4, 0x0, 0x2, 0x2, 0x8, 0x20, 0x10001, 0x4, 0x81, 0x7, 0x8868, 0x5, 0x80000000, 0x6b, 0x3f4e, 0x10000, 0x5, 0xd9, 0xf0c, 0x3, 0x9, 0xf7, 0x1, 0x7, 0x80000000, 0xee39, 0x7, 0x4, 0x8, 0x8, 0x101, 0x5, 0x80000000, 0x400, 0x6, 0x5, 0x2000, 0x1, 0xfffff801, 0x3, 0x0, 0x1, 0x8, 0x553c, 0x0, 0x1f, 0x20, 0x6, 0x5, 0xfff], [0xb928, 0x1f, 0x4, 0x40, 0x8001, 0x0, 0x6, 0x2, 0x800, 0xff, 0x10000, 0x7, 0x8, 0x80000001, 0x10000, 0xf1d7, 0x5, 0x0, 0x9, 0xfffffff9, 0x63, 0x81, 0xfffffffd, 0x3, 0x7a3, 0x3f, 0x4, 0x0, 0x5, 0x800, 0x7fff, 0x100, 0x800, 0x6, 0x3, 0x2, 0x0, 0xfc, 0x400, 0x40, 0x7, 0x7fff, 0x3, 0x5, 0x4, 0x9, 0x80, 0x4, 0xff, 0x5, 0x0, 0x7, 0x6, 0x10001, 0x9, 0x2, 0x10000, 0x0, 0x1, 0x10000, 0x0, 0x55ce, 0x10000, 0x4], 0x18, ['}*}\x00', 'ecryptfs\x00', 'G\x00', 'ecryptfs\x00']}, [""]}, 0x438}, 0x1, 0x0, 0x0, 0x20000000}, 0x20044051) 07:59:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000a0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x11}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1583.112660][T24463] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1583.148734][T24465] 9pnet: Insufficient options for proto=fd [ 1583.164262][T24468] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1583.168946][T24463] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1583.179041][T24471] 9pnet: Insufficient options for proto=fd 07:59:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfpno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1583.235339][T24463] Error parsing options; rc = [-22] 07:59:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x88}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000b0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1583.269832][T24469] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1583.287637][T24469] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfqno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1583.353996][T24480] 9pnet: Insufficient options for proto=fd [ 1583.373274][T24469] Error parsing options; rc = [-22] [ 1583.375188][T24485] 9pnet: Insufficient options for proto=fd 07:59:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000c0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1583.488288][T24490] 9pnet: Insufficient options for proto=fd 07:59:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000d0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfsno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x8000, 0x5, 0x8}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') [ 1583.951592][T24499] 9pnet: Insufficient options for proto=fd [ 1583.964093][T24504] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1583.977838][T24506] 9pnet: Insufficient options for proto=fd 07:59:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000e0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfuno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1583.992810][T24504] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1584.057141][T24504] Error parsing options; rc = [-22] 07:59:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfwno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1584.086138][T24511] 9pnet: Insufficient options for proto=fd [ 1584.109677][T24516] 9pnet: Insufficient options for proto=fd 07:59:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000f0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x66) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_delroute={0x2c, 0x19, 0x134, 0x70bd2d, 0x25dfdbff, {0xa, 0x14, 0x10, 0x3, 0xfe, 0x3, 0xfe, 0x9, 0x800}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_MARK={0x8, 0x10, 0x1f}]}, 0x2c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000100)={0x0, 0x8, 0x101}) r7 = dup2(r0, r3) r8 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000000c0)={r11, 0x1, 0x6, @broadcast}, 0x10) [ 1584.200611][T24520] 9pnet: Insufficient options for proto=fd [ 1584.225281][T24525] 9pnet: Insufficient options for proto=fd 07:59:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfxno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000100000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1584.317874][T24531] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1584.342693][T24531] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1584.359166][T24532] 9pnet: Insufficient options for proto=fd 07:59:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfd%o=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1584.369610][T24535] 9pnet: Insufficient options for proto=fd [ 1584.391091][T24531] Error parsing options; rc = [-22] [ 1584.414110][T24531] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1584.444647][T24531] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1584.484281][T24531] Error parsing options; rc = [-22] 07:59:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = getpid() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r5, 0x0) sendmsg$netlink(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, r10, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x900000, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="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"/395, @ANYRESDEC=r7, @ANYBLOB=',seclabel,euid>', @ANYRESDEC=r8, @ANYBLOB="0025b43b32c6286eb44e432c2d279878", @ANYRESDEC=r10, @ANYBLOB=',fsname=$,\x00']) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e733d66642c726664c06f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1584.663583][T24543] 9pnet: Insufficient options for proto=fd 07:59:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000110000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdn%=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1584.770742][T24552] 9pnet: Insufficient options for proto=fd [ 1584.792842][T24557] 9pnet: Insufficient options for proto=fd 07:59:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000120000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f0000000040)='\x00') 07:59:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1584.920455][T24564] 9pnet: Insufficient options for proto=fd [ 1584.939607][T24568] 9pnet: Insufficient options for proto=fd 07:59:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000180000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdn\\=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x14421, &(0x7f0000000040)='$') 07:59:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000240000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1585.086064][T24578] 9pnet: Insufficient options for proto=fd [ 1585.134613][T24583] 9pnet: Insufficient options for proto=fd 07:59:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f00000000c0)) 07:59:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno\b', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000250000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1585.280890][T24594] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1585.311033][T24594] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1585.317858][T24596] 9pnet: Insufficient options for proto=fd 07:59:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800002c0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno%', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1585.351611][T24600] 9pnet: Insufficient options for proto=fd [ 1585.387742][T24594] Error parsing options; rc = [-22] [ 1585.427865][T24594] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1585.460491][T24594] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000300000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1585.480455][T24609] 9pnet: Insufficient options for proto=fd [ 1585.492885][T24611] 9pnet: Insufficient options for proto=fd 07:59:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB='Wwfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1585.534708][T24594] Error parsing options; rc = [-22] 07:59:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Afdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1585.613741][T24619] 9pnet: Insufficient options for proto=fd [ 1585.631726][T24621] 9pnet: Insufficient options for proto=fd 07:59:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800003c0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Dfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1585.731456][T24624] 9pnet: Insufficient options for proto=fd 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000480000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000140)=""/144) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='openpromfs\x00', 0x2202080, &(0x7f0000000040)='$') [ 1585.848868][T24635] 9pnet: Insufficient options for proto=fd [ 1585.878620][T24640] 9pnet: Insufficient options for proto=fd 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800004c0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Ifdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000520000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Qfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1586.036757][T24651] 9pnet: Insufficient options for proto=fd [ 1586.054621][T24656] 9pnet: Insufficient options for proto=fd 07:59:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1586.113892][T24658] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1586.141625][T24658] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000600000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1586.163079][T24663] 9pnet: Insufficient options for proto=fd 07:59:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1586.194889][T24658] Error parsing options; rc = [-22] [ 1586.195396][T24667] 9pnet: Insufficient options for proto=fd 07:59:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:59:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Rfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000680000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1586.366554][T24678] 9pnet: Insufficient options for proto=fd [ 1586.380407][T24683] 9pnet: Insufficient options for proto=fd 07:59:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Sfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800006c0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0xd2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) [ 1586.494252][T24690] 9pnet: Insufficient options for proto=fd [ 1586.516724][T24694] 9pnet: Insufficient options for proto=fd 07:59:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Tfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1586.540128][T24697] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000740000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1586.569865][T24697] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1586.626437][T24697] Error parsing options; rc = [-22] [ 1586.636662][T24703] 9pnet: Insufficient options for proto=fd [ 1586.657700][T24697] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1586.665045][T24697] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Vfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800007a0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1586.741668][T24697] Error parsing options; rc = [-22] 07:59:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1586.788850][T24713] 9pnet: Insufficient options for proto=fd [ 1586.814541][T24716] 9pnet: Insufficient options for proto=fd 07:59:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000a00000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',bfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000100)={0x13, 0x7, 0x2, {{0x6, 'k[[$-&'}, 0x5}}, 0x13) [ 1586.978227][T24723] 9pnet: Insufficient options for proto=fd 07:59:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000fa0000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1587.024086][T24730] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1587.024155][T24729] 9pnet: Insufficient options for proto=fd [ 1587.045930][T24730] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1587.101685][T24730] Error parsing options; rc = [-22] 07:59:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1587.124646][T24730] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1587.166309][T24730] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000400200000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1587.221650][T24730] Error parsing options; rc = [-22] 07:59:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',gfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x6f) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x81, 0x80000) openat2(r0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)={0x404080, 0x8, 0x1}, 0x18) [ 1587.264952][T24741] 9pnet: Insufficient options for proto=fd 07:59:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000300000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1587.359413][T24751] 9pnet: Insufficient options for proto=fd [ 1587.389674][T24756] 9pnet: Insufficient options for proto=fd 07:59:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000200300000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',qfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1587.416048][T24758] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1587.471270][T24758] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000360300000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',sfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1587.540254][T24766] 9pnet: Insufficient options for proto=fd [ 1587.540431][T24758] Error parsing options; rc = [-22] [ 1587.560392][T24768] 9pnet: Insufficient options for proto=fd [ 1587.638167][T24773] 9pnet: Insufficient options for proto=fd [ 1587.657490][T24777] 9pnet: Insufficient options for proto=fd 07:59:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000b40300000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',ufdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000500000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1587.831666][T24786] 9pnet: Insufficient options for proto=fd [ 1587.854194][T24789] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1587.877974][T24791] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w%dno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000600000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1587.915833][T24791] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w.dno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1587.990265][T24791] Error parsing options; rc = [-22] [ 1587.997691][T24797] 9pnet: Insufficient options for proto=fd [ 1588.018892][T24801] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1588.120462][T24808] 9pnet: Insufficient options for proto=fd [ 1588.139167][T24812] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000000c0)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w/dno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000900000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1588.237279][T24816] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1588.258090][T24819] 9pnet: Insufficient options for proto=fd [ 1588.266803][T24816] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w\\dno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1588.290007][T24824] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000a00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1588.331891][T24816] Error parsing options; rc = [-22] [ 1588.374866][T24829] 9pnet: Insufficient options for proto=fd [ 1588.386104][T24832] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1588.399738][T24834] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wf\ano=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000b00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1588.414706][T24832] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1588.466318][T24832] Error parsing options; rc = [-22] [ 1588.481069][T24838] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wf%no=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000000c0)={@multicast1, @local}, &(0x7f0000000100)=0xc) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f00000001c0)) [ 1588.584497][T24847] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfAno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1588.692472][T24858] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1588.709328][T24858] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1588.729204][T24859] 9pnet: Insufficient options for proto=fd 07:59:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfDno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1588.745089][T24861] 9pnet: Insufficient options for proto=fd [ 1588.775884][T24858] Error parsing options; rc = [-22] 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000d00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfIno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1588.820214][T24858] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1588.838166][T24870] 9pnet: Insufficient options for proto=fd [ 1588.839665][T24858] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1588.904078][T24858] Error parsing options; rc = [-22] 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000e00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1588.952342][T24878] 9pnet: Insufficient options for proto=fd [ 1588.983708][T24882] 9pnet: Insufficient options for proto=fd 07:59:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = openat2(r1, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)={0x204100, 0x2, 0x18}, 0x18) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file1\x00', 0x1000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfQno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000f00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1589.143947][T24890] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1589.144920][T24891] 9pnet: Insufficient options for proto=fd [ 1589.178407][T24896] 9pnet: Insufficient options for proto=fd [ 1589.180998][T24890] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfRno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001100000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1589.265958][T24890] Error parsing options; rc = [-22] 07:59:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfSno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1589.290538][T24900] 9pnet: Insufficient options for proto=fd [ 1589.307458][T24904] 9pnet: Insufficient options for proto=fd 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001200000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1589.436836][T24910] 9pnet: Insufficient options for proto=fd [ 1589.456208][T24914] 9pnet: Insufficient options for proto=fd 07:59:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfTno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001800000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1589.566230][T24921] 9pnet: Insufficient options for proto=fd [ 1589.582348][T24925] 9pnet: Insufficient options for proto=fd 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001f00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfVno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfXno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) r1 = getpid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r3, 0x0) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, r3}}}], 0x20}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = getpid() r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r7, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r7}}}], 0x20}, 0x0) getgroups(0x2, &(0x7f00000000c0)=[r3, r7]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') chdir(&(0x7f0000000140)='./file0\x00') [ 1589.757984][T24933] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000032000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1589.867600][T24944] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1589.880006][T24945] 9pnet: Insufficient options for proto=fd [ 1589.897669][T24944] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wf\\no=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1589.918793][T24948] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002400000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1589.978629][T24944] Error parsing options; rc = [-22] 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfbno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1590.014255][T24947] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1590.027832][T24957] 9pnet: Insufficient options for proto=fd [ 1590.036223][T24947] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002500000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1590.125779][T24947] Error parsing options; rc = [-22] [ 1590.144982][T24969] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfcno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1590.174113][T24974] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bdev\x00', 0x1801800, &(0x7f0000000200)='uW\xecj_\xe6\xe4\xd3p\xad]k/\xc1\x846\r\x877\xb7X\xec\xafgP\xde#\xa5\'\xd5\x04\xd8h\xd2\x90\xefO\x83A{%\x93\xc5\xbf\f\x9e\x9c\xa56\xc9\x00\x00\xb0\xc2:\t\xaa\xf2s:\xc9\x9d\xe2\xe2O\xfb$EW(\xa4\xb1\xb2|E1\xc5\xd2\xe6L^\xa0\x93L\x13#\xfa\x80_\x92\xcdc\xef\x89V|\x91\xbe\n\xb8\x8e;\x8c\xe5~W*\xe5\xf0\xaa|}\xe7\xad)\xf1\x01\xf8\xbd\xbd\xbc\xb8\xb7\xb48GL\xfeB\xdb^\x0ea\xbf\xdd*\xdf\x18\xabb~P\xe6\x1c\xcf;\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa7\xafe\xdc\xcc\x95\b\x14\xed\x1d\xd3\x1cg\xcf\xe5\xc7:^ \x02\xcc\xbb\xd3Sk\xaa)D\x15\xc1\x1d\xce\xdd\xec\xa86\xbf\xf8\x8e\xcd\"\xa1\x94\x18\xf9\x92?\x06p\xe64\x8b.\xcev\t\x06\xe9\xeb\xfa\xae\xdd\xc2\'rZ\xe1\x11\xfb\x1f\xb0\x13\xc31\x18\xfe\xa2d\x1338G\xd4\xcf\x1a\xc2N\xc2W\xc3VE\xc8\a\x98\x1c3J\'IdO\x8e\xdfE\x83.\x10\xe4pPr\xb8\nJ0\xa0c\xbe\xa2\xda\xcbA\x9f\xab{?Te\xec\xb8\xb0+\x97\xe6\x1f\xfak\x10<\xa1\xed\xf8G\x04v]\x06\x90\xe1\xf0\xd1405\x8b1\x89\x0fO\xd9Yj\xeemIj\v\xbf\xb7\x02\x01K\r\xe2DW\fL\x80F- \x18\xd4%993yW\xea\xf5\xb9`\xe2A\xd7+\x0e|\xab\x03X\xb5\xdfE\'\x17\x95\xab\xde\xf3i\xc4\xd5\xbf\x90\xd3\xb7\x85S\xe2\x06\x14\xb1\xdfQ\x91\x91S\x7fi\xf3\xef\xb2\xdc\x05\x7f$SO\xdf\xa8lS\xcf=\x1f\xff\xa0\b\xb8\x84jps\xb7\x92ojny\xbb\x06\x95f3\xfa<\xd5j\xefN\xd0e\xdez\x13\xe6u\xb3\xc7\b\xa9u\xb45>\t\xab\x92Stx\xcc\xe0\x8bF$j\x8e\xca(H\x84S\x16\x02\'m5\x95\xa0W\xc7\xb6\x12/\"\x8f\xde\xbe\xa6p\xea\f\xc4\xfa\x17\v\xb7\x82-\x86\xf1\x10G\x8e\xd1\xde|\x7f`\x85\xcc\x9a\x9b\x06l\nvd\xe4\x1d\xebEI\xfa\x99\xb3\xe1\xdf\xe45\x9f\x8bM=H v\x1d\x96\xc5hse\xa1\x90\x12m\xa6\xa4\xe9\xda\xb0') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=""/27) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x40000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r1, &(0x7f0000000480)="22c08cc49730a3ee8bb962a7af214bfa6e3b5b48d8f12cbb79f9025869119a7603c1789a49db93c6a68c3a377d63b870175d8a748610f1fe46885e0d7e317889ac7833951068e69ff5faeb211ba214cf34e7fc20607f2c7734934837a5452c44cf8453fbfcc241d0d333784102b9", &(0x7f0000000500)=""/46}, 0x20) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x1000, &(0x7f0000000140)="2405e518c977ea21bf68fe055c5b0a3cba8c81a298169bc823550a5006cbd35c3df12135ebd790c82d4d354a67ffe0fe6f37167765607dc467ce6d9672d06040233931") creat(&(0x7f00000000c0)='./file0\x00', 0x80) 07:59:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfgno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1590.293611][T24980] 9pnet: Insufficient options for proto=fd [ 1590.313233][T24985] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ecryptfs\x00', 0x294000a, &(0x7f00000000c0)='$\xd8\xce\xb9}m\x15\x15\xae\az\x16\xfdo[=h\xe5\xb6Z\x82\xedd\xb87\\^\xe2R\x84\xb3\x8cj\x1b[~\xc0W\xd7\xb1k\x06Mmdl\'\x80=\xe6\f\x02\xd8\xa3\x03\xf9-_g\f\x04') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000140)=""/165) 07:59:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000003000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfino=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1590.419319][T24989] 9pnet: Insufficient options for proto=fd [ 1590.445415][T24993] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000033600000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='pstore\x00', 0x200008, &(0x7f00000001c0)='%\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='erofs\x00', 0x0, &(0x7f0000000080)='$') 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfkno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1590.574586][T25002] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000003c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1590.682892][T25015] 9pnet: Insufficient options for proto=fd [ 1590.704106][T25017] 9pnet: Insufficient options for proto=fd 07:59:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wflno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) socket$isdn_base(0x22, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000300)={0x9e0000, 0xff, 0x2, r0, 0x0, &(0x7f00000002c0)={0x9a091c, 0xf, [], @ptr}}) recvmsg(r7, &(0x7f0000002540)={&(0x7f0000000380)=@hci, 0x80, &(0x7f0000002500)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/218, 0xda}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x3}, 0x2041) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@map=r5, r7, 0x20, 0x1, r8}, 0x14) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r5, 0xc034564b, &(0x7f0000000000)={0xfffffffe, 0x42303159, 0xb, 0x4, 0x3, @stepwise={{0x3, 0x1}, {0x8080000, 0x9}, {0x2}}}) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000000c0)={0x7fff}) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, &(0x7f0000000240)={{0x0, @dev={0xac, 0x14, 0x14, 0x19}, 0x4e22, 0x3, 'dh\x00', 0x11, 0x5, 0x17}, {@broadcast, 0x4e24, 0x957e2d19896c8580, 0x80000000, 0xfff, 0x2}}, 0x44) 07:59:53 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x168) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000100)=0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000003f00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1590.845428][T25029] 9pnet: Insufficient options for proto=fd [ 1590.872457][T25038] 9pnet: Insufficient options for proto=fd [ 1590.880691][T25037] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfono=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x11}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x80000001, 0x200800) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)={0x2}) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x80, 0x3}}, 0x14) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000000c0)={0x7fff}) io_setup(0xffff, &(0x7f0000000000)) [ 1590.925726][T25037] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000024000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1591.000460][T25037] Error parsing options; rc = [-22] [ 1591.018154][T25047] 9pnet: Insufficient options for proto=fd 07:59:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfpno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1591.047383][T25051] 9pnet: Insufficient options for proto=fd 07:59:53 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x4) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 07:59:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x88}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004800000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfqno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x1100}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1591.191059][T25063] 9pnet: Insufficient options for proto=fd [ 1591.207572][T25066] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1591.218543][T25066] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1591.289446][T25066] Error parsing options; rc = [-22] 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000005200000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1591.317544][T25070] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1591.338052][T25070] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1591.361723][T25075] 9pnet: Insufficient options for proto=fd 07:59:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r10 = dup(0xffffffffffffffff) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r11, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfsno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x3f00}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1591.382526][T25080] 9pnet: Insufficient options for proto=fd [ 1591.402814][T25070] Error parsing options; rc = [-22] 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000006000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r0, 0xe}}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:53 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x8000}) 07:59:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfuno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1591.522759][T25089] 9pnet: Insufficient options for proto=fd [ 1591.541728][T25094] 9pnet: Insufficient options for proto=fd 07:59:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x8800}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1591.569125][T25098] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1591.590539][T25098] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000006800000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:53 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000002, 0x1010, r1, 0x7a052000) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1591.654781][T25098] Error parsing options; rc = [-22] 07:59:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x1000000}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfwno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1591.675074][T25105] 9pnet: Insufficient options for proto=fd [ 1591.692429][T25110] 9pnet: Insufficient options for proto=fd 07:59:53 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:53 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x9a1a}}) 07:59:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000006c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x11000000}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1591.812444][T25119] 9pnet: Insufficient options for proto=fd [ 1591.840738][T25124] 9pnet: Insufficient options for proto=fd 07:59:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000007400000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfxno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat$cgroup_freezer_state(r1, &(0x7f0000000000)='freezer.state\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:54 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x420000, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') [ 1591.961697][T25133] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1592.002218][T25133] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1592.020887][T25141] 9pnet: Insufficient options for proto=fd 07:59:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x3f000000}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000007a00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd%o=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1592.042763][T25143] 9pnet: Insufficient options for proto=fd [ 1592.068417][T25133] Error parsing options; rc = [-22] 07:59:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x2, {{0xfffffffffffffffd, 0x9, 0x1, r2}}}, 0x28) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1ec, 0xb, 0x2, 0x201, 0x70bd2c, 0x25dfdbfe, {0x1, 0x0, 0x3}, [@generic="470086b84515a325bdf4c4dc3015b3b5136ec57982293e367e025ad4ec9b6798af6453fa6c0405c7d760fa9a1c81a453d5d2f3630675e5fa540aa6d9892eeb518eac4e976d305b80821f3417b08f571c7ff4acb84ef101fbd1a9af", @typed={0x8, 0x1f, 0x0, 0x0, @u32=0x1}, @generic="2c1c3d9bd297a10de5eb6fd27ec2b92b2c919a39e9dc74c0d35f5e99a93d3d07c9967af3e9f960f36d58981e2bc8b8a36521ea1d43f55d96e13b51b63b1d1398df384dc831c291dcd7229788c0ef4075fefa0b72516c034afb1d978d52ffb14501f9787436fa887581847a5ccb6a3320d1d59ace7e30d3dcde8c57c6d4db4bd4b0aae2b1bb816139a907fbaed55847898a43130039bb3b94af8bf8ce09192672aa889fd11441397e6d05cb55d15e479de4f8a1da44294de0330196611c43f6f0116176", @nested={0xae, 0x8a, 0x0, 0x1, [@generic="e08ab811dd36339e8c53a144065a256e939ffbe7bfa77731efe8631489b15ded2c748a59b3d93dbc837e3a29d833c1b35341cd584261635ac2780c2697d46ecd29b778c6d19fe9866cf15d28e228dbc06013322541381c8428e032fd3d002bea34e60d241f3b07b34227d8938e8d856d735969b35635787cf5a1943540769679797df85e104c301690475ad5759d6ecddac9a50c87fe23a40be3c8269f73ffd39c88a8ee627892ce7818"]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) [ 1592.101049][T25133] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1592.117668][T25133] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000a000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7eff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) 07:59:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x88000000}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c776664c06f3d", @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1592.192718][T25133] Error parsing options; rc = [-22] [ 1592.192918][T25155] 9pnet: Insufficient options for proto=fd [ 1592.227285][T25157] 9pnet: Insufficient options for proto=fd 07:59:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ext2\x00', 0x84080, &(0x7f0000000080)='\x04>OU\x06\x12\xa1n@\xbb') lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x80000001, 0x77e}]}, 0xc, 0x2) socket$nl_rdma(0x10, 0x3, 0x14) 07:59:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0xfffffffd}}) openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/access\x00', 0x2, 0x0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000280)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x1, {[@global=@item_012={0x0, 0x1, 0x5}]}}, 0x0}, 0x0) syz_usb_control_io$printer(r1, &(0x7f0000000080)={0x14, &(0x7f0000000100)={0x0, 0x22, 0xbb, {0xbb, 0x2, "1ba7631a4fe6889fd784ebd696e7017b0e93f97c64cd86da88b16f66a731ab16e6256ce46957bfd13d754f057747132c10faccbce846a524384c32ec64055a0852c485102f6427caaa344bb27ef80c762f55f565f475192246da0018ae7c199e6a38cdd429e6e3ac192193be209c57dc5e74c9a44fefc3ffcb5606896d5bfc50ff93fd1268f3a2eda06e95e38d0a596d807810bed273dfd15a677117a14cc4fd20b7e53f0024b5707f48daea4954e2651e347f8555cc3f56f4"}}, &(0x7f0000000200)={0x0, 0x3, 0x75, @string={0x75, 0x3, "56ac83078d330d19e72b191de33bc775fd72e9e54a26d06b5d160dda1b2235f4489ca1583c0a3320a5031550ede35adfbcb4082d584b53d84f6212367a7b598736bc7970f5bb7722e0234f55f2a6e3df96cfad9dde7016b974830e484b5cf296c4c5d3ca68b4b58b6b71014e89dae894e0cde9"}}}, &(0x7f0000000440)={0x34, &(0x7f0000000280)={0x40, 0xb, 0x73, "2db6833c95c39092c526ae089b361bb989d90ab46bafb5c6bbcf4e971165119c9c2da73cb997c3c3136df25890a0180e40274f84e316b42283d2a5bf53830680f3507871b9324a7b14c76ef228926aaf6e0298ec3e71181c82b2b5ef83ec650f66ead88d152dc30a76b467bc2fe01f394cce12"}, &(0x7f0000000300)={0x0, 0xa, 0x1, 0xd6}, &(0x7f0000000340)={0x0, 0x8, 0x1, 0x8}, &(0x7f0000000380)={0x20, 0x0, 0x24, {0x22, "207487dff7bf2ea607315a6333edbaa0f2cba6e38545c7c2922f6f5ee5b881175c1d"}}, &(0x7f00000003c0)={0x20, 0x1, 0x1, 0xff}, &(0x7f0000000400)={0x20, 0x0, 0x1, 0x4e}}) 07:59:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdn%=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000003b400000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1592.344300][T25168] 9pnet: Insufficient options for proto=fd 07:59:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x0, 0x11}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000fa00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e21, @private=0xa010102}}, 0x0, 0x0, 0x26, 0x0, "6bbfd373f0f93ca5dfc522c8fdb985a95701000000e1214a0297a3311ca5f278fafbe2f5ef6c6e1ecce2080060b56844bd8b1c2e73bd478f24e8020058429e3b997ee29da77300"}, 0xd8) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000180)='9p\x00', 0x30464ca, &(0x7f00000001c0)='\xabj$\x8enOK\xc9\x9f\x8b\x98YR\x05\\\x0e\xf4\xed\xb1\xbf\xad\xd6$\xe5\xa2\xa6\xcf\xb4\xb2\x99\xbb\xbe\xdcJa\xf4\x00\x04\x00\x00\xff~\x93\xab\xa6\xe9\xca_\nqf\xf3\x06N\xdc#;e\"n\xc5\xaa\xd5Ke\'\xbd#|Zx\xf8g7\xb5\xae\x03.\xd4\x14L\xd4\x1a\x18\xe4\xee\xff\a6pC!\nn\xd8vW2\x12\x95}\xb0\xa6H\xf2M>V\xf8{\x17g\xc7`\xccKp\xec\xbef\x80\xf0\xd0') 07:59:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x0, 0x88}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdn\\=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1592.460016][T25182] 9pnet: Insufficient options for proto=fd [ 1592.482882][T25187] 9pnet: Insufficient options for proto=fd 07:59:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000ff00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:54 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c0000006d00050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002c0034801400360064756d6d79300000000000000000000014003500697036677265300000000010000000008277edb20acbd67149b92fa0ae80cb580d6848a16d7f5faf9c781519003e21c722da3ad8c8efd2278953e6cdac089f03d3d5780f7c677c25f970a1314acd40fd406256835b36c7e1ac55d8f7cc8427c535e4afa9a5fd6bcbbfa45390a083b74e50ba2d124ac744bfa69d150b0832bfc82d079296b83840e5bc763977e2196f613f4ebbf1e687dab655171e10683288c249a67ad1fa8a1375aeef8bc0eeb6210c8c72c05b"], 0x4c}}, 0x0) copy_file_range(r0, 0x0, r1, &(0x7f0000000100)=0x81, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') ioctl$HIDIOCGRAWNAME(r3, 0x80404804, &(0x7f0000000240)) 07:59:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno\b', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1592.590982][T25198] 9pnet: Insufficient options for proto=fd [ 1592.617423][T25200] 9pnet: Insufficient options for proto=fd [ 1592.726630][T25208] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1592.746359][T25209] 9pnet: Insufficient options for proto=fd [ 1592.753709][T25208] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1592.769281][T25213] 9pnet: Insufficient options for proto=fd [ 1592.795365][T25208] Error parsing options; rc = [-22] [ 1592.833073][T25212] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1592.845898][T25212] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1592.870122][T25212] Error parsing options; rc = [-22] 07:59:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000040)) 07:59:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f00000001c0)='wg2\x00', 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x40) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000240)={0x2, 0x3, 0x1, 0x5, r6}) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$DRM_IOCTL_MODE_GETFB(r5, 0xc01c64ad, &(0x7f00000000c0)={0x5, 0xffffffff, 0xc095, 0x0, 0x6, 0x3, 0x7fffffff}) 07:59:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x11, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000075fa08000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno%', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 07:59:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000100)=0x1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) write$cgroup_devices(r3, &(0x7f0000000080)=ANY=[@ANYBLOB='P *:* rm\x00'], 0x9) [ 1593.023037][T25227] 9pnet: Insufficient options for proto=fd [ 1593.038598][T25228] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1593.040713][T25231] 9pnet: Insufficient options for proto=fd 07:59:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="5763616368657461673d0f"]) 07:59:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000010000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x88, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1593.080911][T25228] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1593.136184][T25228] Error parsing options; rc = [-22] 07:59:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x1100, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)={r4, 0x1000, "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"}, &(0x7f0000000240)=0x1008) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r6, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x100, r6, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xec, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xde}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x30}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4c804}, 0x20044040) 07:59:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c632f6368657461673d0f"]) [ 1593.196904][T25243] 9pnet: Insufficient options for proto=fd [ 1593.222550][T25245] 9pnet: Insufficient options for proto=fd 07:59:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000020000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)={0x1c, r3, 0x1, 0x0, 0x0, {0x2}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl0\x00', r11, 0x29, 0x3f, 0x1, 0x80000001, 0x11, @private0, @mcast2, 0x1, 0x10, 0x9, 0xd789}}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x74, r3, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xae}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5f, 0xffffffffffffffff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x1}}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffffffff}}]}, 0x74}, 0x1, 0x0, 0x0, 0xc080}, 0x845) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x3f00, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000030000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c635c6368657461673d0f"]) 07:59:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x8800, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1593.484099][T25265] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1593.532230][T25265] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000040000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1593.615413][T25265] Error parsing options; rc = [-22] 07:59:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000060000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616307657461673d0f"]) 07:59:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x1) uname(&(0x7f0000000180)=""/132) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x11, 0x0}}}, 0xe8) 07:59:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000080000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616364657461673d0f"]) 07:59:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f00000001c0)) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) bind(r0, &(0x7f00000000c0)=@generic={0x9b66491dd3be5aea, "099dae6484259a8e91f184e88419c87e8bfe5f1d92f912dce35e4bf0736d687b1bbbd54e4e61de7060aa921f60ad8c8427f31b9a4611ee22461769c4f4b8fa633e30a10cfd6b56ca99010a1c8e95f56d39f7fbfd82c2824d5cc9fc06cb1fd4282f2ae93a90628cf1ab7631329d3b8d21dbcb69576aa5b48a17380383f8cc"}, 0x80) 07:59:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x88, 0x0}}}, 0xe8) [ 1594.283525][T25306] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:56 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) write$tun(r0, &(0x7f0000000100)={@val={0x0, 0x8035}, @void, @eth={@remote, @multicast, @void, {@ipv6={0x86dd, @generic={0x6, 0x6, "a88e47", 0x1208, 0x33, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x3d}, {[@routing={0x67, 0x2, 0x1, 0x9, 0x0, [@mcast1]}, @dstopts={0x88, 0x1, [], [@pad1, @jumbo={0xc2, 0x4, 0x101}]}, @dstopts={0x84, 0x0, [], [@enc_lim={0x4, 0x1, 0xfe}, @enc_lim={0x4, 0x1, 0x8}]}, @srh={0x5c, 0xa, 0x4, 0x5, 0x1, 0x0, 0x7, [@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x1e}, @private2={0xfc, 0x2, [], 0x1}, @mcast1]}, @dstopts={0x6c, 0x12, [], [@generic={0x6, 0x87, "7dc91c931ce04843b6076c03073cd36608ddae67424f4d39e16b1b23e020dad070bba8085f91405533add5d80efa9b496c3118ed9f845d782e41e50d5acb662fc2ecbcd760faf7eb841f2788740580234b06d29dfddea2cc54b6473340b7e1339adca3dfb37988996f8847c72e67349dfc3f93d24cd3f8e0cec6298e0948a0b1a100d0db53587a"}, @jumbo={0xc2, 0x4, 0x2}, @enc_lim={0x4, 0x1, 0x1}]}, @dstopts={0x0, 0x4, [], [@enc_lim={0x4, 0x1, 0x6}, @generic={0x3, 0x1d, "1898bbb0734735c87cd397d38a8772be37dd6beb815b29bb0fbad943fa"}]}, @routing={0x32, 0x8, 0x0, 0x50, 0x0, [@ipv4={[], [], @rand_addr=0x64010101}, @loopback, @private0={0xfc, 0x0, [], 0x1}, @loopback]}, @srh={0x18, 0x8, 0x4, 0x4, 0x8, 0x10, 0x101, [@local, @ipv4={[], [], @loopback}, @remote, @empty]}, @hopopts={0x67, 0x1, [], [@ra, @ra={0x5, 0x2, 0x4}]}], "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"}}}}}}, 0x1242) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000ffff80000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1594.355784][T25306] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6361636b657461673d0f"]) [ 1594.417786][T25306] Error parsing options; rc = [-22] [ 1594.455055][T25306] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000a0000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1594.500165][T25306] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100000, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r1, 0x8010550e, &(0x7f0000000080)={0x75, &(0x7f0000000100)="ae260bbdf006331c64a9e99d172317d6900a52a63ec78807aec9e2a5f7e2fae3f249661d5356528b68836cd353f48934ba5b220f6d2faedaa63a1a1f9390d09ca7996392145c1f2e02fd0e06fa13ed5047546c1bf6ce1677461103aec53000"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x29}) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) open_tree(r3, &(0x7f0000000180)='./file0\x00', 0x800) [ 1594.572808][T25306] Error parsing options; rc = [-22] 07:59:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x11}}, 0xe8) 07:59:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000010000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x101) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SIOCNRDECOBS(r3, 0x89e2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioctl$GIO_UNIMAP(r0, 0x4b64, &(0x7f0000000140)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000100)={r6, 0x40, 0x1, 0x1}) setsockopt$IP_VS_SO_SET_DEL(r7, 0x0, 0x484, &(0x7f00000001c0)={0x89, @empty, 0x4e24, 0x1, 'lc\x00', 0x1, 0x1f, 0x70}, 0x2c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 07:59:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6361636c657461673d0f"]) 07:59:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000020000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1594.791797][T25343] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1594.816544][T25343] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x88}}, 0xe8) 07:59:57 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x6118000}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x2b8, r3, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x10000, @mcast1, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}}}}]}, @TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6d26}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_SOCK={0x80, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x511f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x58}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x14d8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb61}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x768}]}, @TIPC_NLA_MEDIA={0x94, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x85}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0x74, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x5d, 0x3, "fe8537e151ee7548fbe9c89d7de8db0d56146edad961ec3d7a35380b7d204bfc0cecb1b80877e75ef9035921e698047278cd3cfd57acaa28b27b501a44aee4be573b8d4e8ec536ad517e2ee025706102fbc60df82f6c51234c"}, @TIPC_NLA_NODE_ID={0xf, 0x3, "d8d8ed074c0e7917a33c44"}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x504}]}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x8084}, 0x4004800) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x1, 0x9, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x8001}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3f}}]}, 0x38}}, 0x448d0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1594.868003][T25343] Error parsing options; rc = [-22] 07:59:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000030000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x842, &(0x7f0000000040)='$') 07:59:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2080, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, 0x2, 0x7, 0x5, 0x0, 0x0, {0x5, 0x0, 0x3}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2972}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xfffffc00}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8acb}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x99}]}, @NFACCT_QUOTA={0xc}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8001}, @NFACCT_FILTER={0x4c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xdf5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xffffff81}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x5}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0xa8}}, 0x5) 07:59:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1100}}, 0xe8) [ 1595.063068][T25364] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000040000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1595.101971][T25364] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1595.162902][T25364] Error parsing options; rc = [-22] 07:59:57 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 07:59:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000050000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3f00}}, 0xe8) 07:59:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c636163c0657461673d0f"]) 07:59:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='v7\x00', 0x0, &(0x7f0000000040)='$') openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) 07:59:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$HIDIOCGRDESC(r2, 0x90044802, &(0x7f0000000100)={0x4c5, "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"}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000060000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8800}}, 0xe8) 07:59:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000070000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1000000}}, 0xe8) 07:59:57 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000080)={0x2, 'caif0\x00', {0x7}, 0x20}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$BLKSECTGET(r6, 0x1267, &(0x7f0000000100)) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$TIOCGRS485(r3, 0x542e, &(0x7f0000000040)) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x4, 0xffffffff}}) 07:59:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000080000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$getregs(0xc, r0, 0x100000001, &(0x7f00000001c0)=""/238) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f00000000c0)=0x2) 07:59:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x11000000}}, 0xe8) [ 1595.761571][T25415] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000090000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368257461673d0f"]) [ 1595.799309][T25415] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_PCM_IOCTL_PREPARE(r2, 0x4140, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3f000000}}, 0xe8) [ 1595.893776][T25415] Error parsing options; rc = [-22] 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000a0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x77ff, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x5, 0x2, 0x3, 0x9, 0x80, 0x6, 0x1}) 07:59:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x88000000}}, 0xe8) 07:59:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000240)=0x8) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)=r5) 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000b0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c636163685c7461673d0f"]) [ 1596.127032][T25444] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1596.160606][T25444] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:58 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)) [ 1596.216840][T25444] Error parsing options; rc = [-22] 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000c0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1596.242390][T25444] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1596.278643][T25444] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368652561673d0f"]) 07:59:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x11}}, 0xe8) 07:59:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socket$inet6_sctp(0xa, 0x1, 0x84) [ 1596.352784][T25444] Error parsing options; rc = [-22] 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000d0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000e0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x88}}, 0xe8) 07:59:58 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x183) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'erspan0\x00', &(0x7f0000000080)={'gretap0\x00', r4, 0x60d552c0450d60a5, 0x8000, 0x5, 0x1, {{0x6, 0x4, 0x1, 0x16, 0x18, 0x65, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @local, {[@noop]}}}}}) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000f0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368652f61673d0f"]) 07:59:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') umount2(&(0x7f00000000c0)='./file0\x00', 0x6) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r3, 0x0) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, r3}}}], 0x20}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r10, 0x0) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x5, &(0x7f00000006c0)=[{&(0x7f00000001c0)="0f31f854124d276aa37d1f8980cbb793ebde3581bb16c8", 0x17}, {&(0x7f0000000200)="a45de67fa0244eca4473ad4a3e293a352963c18e5889fc84b6c95165a3dab02952a28cce3fd889262948167fb6222c0c7873c5f15783f360842f18c75adfdfaf60a39eb8c17a44de090dbd81187245e173dbefbb2e5e15d1467416647006a7c83c5943739c9be730e72055fd821f96c8ff6b2894efcf3108d1c130091207c57230510ca10b14feaf2c8005da92b6094d55a79a7ad378cc655484d3586169f19599001232a004f11f26ce2d5116b4403d8a6b24e87bb62623", 0xb8, 0x1f}, {&(0x7f00000002c0)="e388497ecc8fb60b2d5618a6fb22a88df2b525103a0d50f19c2c5ee7e8c383db38500173dcfb142337b2efac320172c62ad06473b682cb8834e0601212b9e2cff8b1e1416a5d4a3d85093d3dec67c6e934a267ae8cc221b8dbd8a6ca8d9a05b2110b587672644e71346d4be71bc28a2964f8cc93fc8e425bf2b0463e0daa75e23acb53c7ee6d3a9d9d954ee50cd2cefbba3763f3ef8e152d7ebcacc458c98d950acd8e9d111c773050145ee23ac986826d673c541b02761c9b3b6e9232cc112ff9a2222e40fe7be2064a019419b2d2835e4f8d8ddb0b", 0xd6, 0x9}, {&(0x7f0000000600)="2f50be3be790", 0x6, 0x1}, {&(0x7f0000000640)="8de5953327f15f91f14eb25aff5acc3eac27daf39a0419c3ba6c0a16dbee3e73443beb810f0cec2585714f0b62a6f3a881dc09f5b08df3419405418ee6624296b736ab53b4e59037abbeae1b99673b5d5a804345b1561e8307328dd595bec924917a5cf840ad780680c476f0a380d40e18374fa022a55368978a00db", 0x7c, 0x7}], 0x2100000, &(0x7f0000000500)={[{@dmask={'dmask', 0x3d, 0x7f}}, {@gid={'gid', 0x3d, r3}}, {@dmask={'dmask', 0x3d, 0x20}}, {@uid={'uid', 0x3d, r5}}], [{@fowner_gt={'fowner>', r6}}, {@context={'context', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@uid_lt={'uid<', r8}}, {@fowner_eq={'fowner', 0x3d, r10}}]}) 07:59:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000100000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x24000000) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1596.790360][T25498] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1596.825655][T25498] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368655c61673d0f"]) 07:59:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x11}}, 0xe8) [ 1596.891200][T25498] Error parsing options; rc = [-22] 07:59:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000110000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1596.916156][T25498] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1596.953106][T25498] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 07:59:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x88}}, 0xe8) 07:59:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000120000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1597.032396][T25498] Error parsing options; rc = [-22] 07:59:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={r4, @in={{0x2, 0x4e22, @remote}}}, &(0x7f0000000040)=0x84) 07:59:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 07:59:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6361636865742f673d0f"]) 07:59:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000180000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:59 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x800) bind$bt_l2cap(r0, &(0x7f00000001c0)={0x1f, 0x6756, @none, 0x1f, 0x2}, 0xe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x0) keyctl$revoke(0x3, r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 07:59:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001f0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x11}}, 0xe8) 07:59:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6361636865745c673d0f"]) 07:59:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000200000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 07:59:59 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x8) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000000c0), 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x104000, &(0x7f0000000040)='$') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x240, 0x0) 07:59:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x88}}, 0xe8) 07:59:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000003200000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:00 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x1ff, {0x0, 0x1}}) 08:00:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) read$smackfs_ptrace(r1, &(0x7f00000000c0), 0x14) 08:00:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6361636865746167080f"]) 08:00:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000240000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000250000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1598.096085][T25572] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1598.126850][T25572] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x11}}, 0xe8) 08:00:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6361636865746167250f"]) [ 1598.186138][T25572] Error parsing options; rc = [-22] 08:00:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RREAD(r1, &(0x7f0000000040)={0x20, 0x75, 0x2, {0x15, "a8bf61a1ee053e26d09d5575c0538a730f9e69c3f2"}}, 0x20) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) getsockname$packet(r6, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r9 = ioctl$TIOCGPTPEER(r6, 0x5441, 0xfffffffffffffffd) pidfd_getfd(r4, r9, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xd67) 08:00:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x88}}, 0xe8) 08:00:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000002c0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d02"]) 08:00:00 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mmap$snddsp_status(&(0x7f0000ffc000/0x3000)=nil, 0x1000, 0x5, 0x30, r2, 0x82000000) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1598.885355][T25572] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1598.897343][T25572] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1598.925067][T25572] Error parsing options; rc = [-22] 08:00:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000003360000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1100}}, 0xe8) 08:00:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) statx(r1, &(0x7f0000000040)='./file0\x00', 0x400, 0x40, &(0x7f0000000100)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d03"]) [ 1599.031023][T25625] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000003c0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0xa0a9, 0x3, 0x3ab, 0x8, 0x0, 0xf000}) 08:00:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x3f00}}, 0xe8) [ 1599.073688][T25625] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1599.136558][T25625] Error parsing options; rc = [-22] 08:00:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000003f0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1599.160693][T25640] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1599.191236][T25640] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d04"]) 08:00:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="0100fd200d976ba78f1f00", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={r6, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r7, 0x5}, 0x8) [ 1599.271907][T25640] Error parsing options; rc = [-22] 08:00:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000400000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x8800}}, 0xe8) 08:00:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, 0xe8) 08:00:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000002400000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d05"]) 08:00:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x11000000}}, 0xe8) 08:00:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000480000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d06"]) 08:00:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000004c0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}, 0xe8) 08:00:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000009140)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000003c0)={0x14, r5, 0x390c179b360adb45}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x2000, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, r5, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@GTPA_VERSION={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_VERSION={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r7}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_NET_NS_FD={0x8, 0x7, r8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000040}, 0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') [ 1599.870931][T25687] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1599.899905][T25687] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1599.941949][T25687] Error parsing options; rc = [-22] [ 1599.992438][T25693] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1600.010211][T25693] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1600.045951][T25693] Error parsing options; rc = [-22] 08:00:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=\a']) 08:00:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000520000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x88000000}}, 0xe8) 08:00:02 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000040)) 08:00:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000ffbffa5f0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:02 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x20}}) 08:00:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=\b']) 08:00:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000680000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}, 0xe8) 08:00:02 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r5) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000006c0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}}, 0xe8) 08:00:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=\t']) 08:00:02 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x200000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048010}, 0x800) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000740000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}, 0xe8) 08:00:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000008fa750000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=\n']) 08:00:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}, 0xe8) 08:00:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000007a0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4020, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize'}}], [{@audit='audit'}, {@smackfsdef={'smackfsdef'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x30, 0x0, 0x64, 0x34, 0x39, 0x39, 0x31], 0x2d, [0x33, 0x39, 0x66, 0x35], 0x2d, [0x35, 0x63, 0x31, 0x65], 0x2d, [0x35, 0x39, 0x36, 0x37], 0x2d, [0x31, 0x61, 0x63, 0x34, 0x52, 0x33, 0x36, 0x38]}}}]}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000001100)={'ip6tnl0\x00', &(0x7f0000001080)={'ip6_vti0\x00', 0x0, 0x29, 0x1f, 0x3e, 0x0, 0x9, @dev={0xfe, 0x80, [], 0x14}, @remote, 0x7800, 0x10, 0x3, 0x7}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000011c0)={'erspan0\x00', &(0x7f0000001140)={'gre0\x00', r2, 0x10, 0x40, 0x219d2ae8, 0x8df, {{0xb, 0x4, 0x2, 0x1, 0x2c, 0x64, 0x0, 0xaa, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x12}, @dev={0xac, 0x14, 0x14, 0x2a}, {[@cipso={0x86, 0x17, 0x2, [{0x2, 0x5, "b4e8ec"}, {0x3, 0x7, "6bae13bc28"}, {0x6, 0x5, "e7bf2c"}]}]}}}}}) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001a40)={&(0x7f0000001200)={0x840, 0x0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x280, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x34, 0x4, [{0x0, 0xea, 0x5, 0xc31}, {0x6, 0xfa, 0x78, 0x3}, {0x7080, 0x0, 0x81, 0x400}, {0x1, 0xf8, 0x6}, {0x696b, 0xef, 0x4, 0x1}, {0xe1, 0x80, 0x4, 0x58}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x44}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x220, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x70}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x1ff, 0x40, 0x2, 0x44}, {0x1f, 0x7, 0x8, 0x2}, {0x101, 0x12, 0xff, 0x6}, {0x7, 0xfe, 0x9e, 0x5}, {0xff, 0x9, 0x1, 0x3}, {0x7, 0x6, 0x5b, 0x8000}, {0x4, 0x1}, {0x4, 0x1, 0x2, 0x1}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r8}}, {0x8, 0x7, 0x80}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r12}}, {0x8, 0x7, 0x100}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x31}}}]}}]}, 0x840}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x285009, &(0x7f0000000040)='$') 08:00:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000ffffff850000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800}}, 0xe8) 08:00:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=\v']) 08:00:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000100)=0x44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x5c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r5, 0x20, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x40}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xf7}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xfffa}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x80) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x100000}}) 08:00:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000ffffff9c0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, 0xe8) 08:00:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=\f']) 08:00:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000ffffff9f0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}}, 0xe8) 08:00:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000080)={0x8, @rand_addr=0x64010100, 0x4e20, 0x3, 'lblcr\x00', 0x1c, 0xfff, 0x38}, 0x2c) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000040)={0x5, 0x100, 0x8, 0x4, 0x3ff}) 08:00:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000003b40000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x9c1d3ee763c2181a, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[r3, r4, r5]}, 0x3) 08:00:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=\r']) 08:00:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}, 0xe8) 08:00:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000fa0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fanotify_mark(r1, 0x20, 0x20, r1, &(0x7f0000000100)='\x00') ioctl$HIDIOCINITREPORT(r1, 0x4805, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000000}}, 0xe8) 08:00:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000ff0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0e"]) 08:00:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'rose0\x00'}]}]}, 0x4c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46040000", @ANYRESDEC, @ANYBLOB="ff830af41b0000000000", @ANYRES32=r5], 0x4}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x34, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_IFNAME={0x14, 0x3, 'ip6_vti0\x00'}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000100)={'syztnl1\x00', r12, 0x4, 0x80, 0x7, 0x2, 0x4d, @local, @empty, 0x7840, 0x80, 0xffff0e53, 0x20}}) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r6, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffeff}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r13}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xff}]}, 0x44}, 0x1, 0x0, 0x0, 0x40004}, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) [ 1601.843253][T25826] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1601.879495][T25826] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1601.956297][T25826] Error parsing options; rc = [-22] 08:00:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800005ffabfff0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1602.002982][T25841] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d13"]) [ 1602.045278][T25841] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080ffff0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1602.120996][T25841] Error parsing options; rc = [-22] 08:00:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}, 0xe8) 08:00:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x64e}}) 08:00:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RREADDIR(r1, &(0x7f0000000240)={0x87, 0x29, 0x1, {0x0, [{{0x80, 0x1, 0x6}, 0x1, 0x3, 0x7, './file0'}, {{0x60, 0x4, 0x6}, 0x0, 0x3, 0x7, './file0'}, {{0x20, 0x3, 0x8}, 0x200, 0xff, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0x7fffffff, 0x3, 0x7, './file0'}]}}, 0x87) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000200)='./file0\x00', 0x2c) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000001c0)=0x2, 0x4) mount(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000085ffffff0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) openat$smackfs_revoke_subject(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/revoke-subject\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}}, 0xe8) 08:00:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x7fffffff, 0x3d4b}, {0x9, 0xb485}]}, 0x14, 0x0) 08:00:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800009cffffff0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}, 0xe8) 08:00:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) recvfrom$unix(r1, &(0x7f0000000100)=""/143, 0x8f, 0x2000, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x40000, 0x8}}) 08:00:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',cachetag=^']) [ 1602.509795][T25881] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800009fffffff0000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}, 0xe8) [ 1602.560152][T25881] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1602.631452][T25881] Error parsing options; rc = [-22] 08:00:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000010000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0xd081, &(0x7f00000000c0)='$Mn3\x13\xf0\xc6\xe6G\xff\x0f\xfbD\xe5\x0fe\x04\x00\x00\x00,\x90\x81\x96\xddZP\xc1\f\x010xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x10c) 08:00:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800}}, 0xe8) 08:00:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 08:00:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000100000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, 0xe8) 08:00:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000200000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}}, 0xe8) 08:00:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:00:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000300000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r3, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r3, 0x200, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x8000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x4000808) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='squashfs\x00', 0x0, &(0x7f0000000040)='$') open(&(0x7f00000000c0)='./file0\x00', 0x721101, 0x182) 08:00:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}, 0xe8) 08:00:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.effective_cpus\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r3, 0x0, 0x6, &(0x7f0000000100)='\\!:\\]\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='9p\x00', r4}, 0x30) ptrace$getsig(0x4202, r5, 0x40, &(0x7f0000000180)) r6 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB="2c63616368657461673d0f"]) 08:00:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) fcntl$setpipe(r3, 0x407, 0x1) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB="2c63616368657461673d0f"]) 08:00:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x8000, &(0x7f00000000c0)='B\xcb\xb0^\xb3x\xd8:\xf8\x97\x04e\x92\xf5\xc5\x8fzNC\xd3}\xbdS\xac\x16\x91\xa2&\xa3\xcf\x96\xa2H\xc7\n\x84#k\x99\xb7q\xae\xd2\\%n2\x91\xa1y\xde\x8b\xf6\x98\x82W\xce\x8fu\x1b\x9af\x8d\t\x99\x03\x1d\xf0u\xd0p\xed\x8bU\xc2{.A\x8b\xb1\x1a\xb5&\xd5-\tc:a\xcbUh\xb6\x9c%\xa0\x1few#`g\r\xa1\xf2rL?\xd2\xb3A\'P[\xdb\xd3\x8a\v\xaf\x84\x861\x7f\xf4\xdd') 08:00:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000ffffc90000e1300000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000000}}, 0xe8) 08:00:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = dup(r1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="43fca69ffec802f963b7f877f6c4bc9d", 0x10) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000400000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESDEC=0x0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYRESHEX=0x0]) [ 1603.583911][T25945] sysfs: Unknown parameter 'BË°^³xØ:ø—e’õÅzNCÓ}½S¬‘¢&£Ï–¢HÇ [ 1603.583911][T25945] „#k™·q®Ò\%n2‘¡yÞ‹ö˜‚WÎušf ™ðuÐpí‹UÂ{.A‹±µ&Õ- c:aËUh¶œ% ew#`g ¡òrL?Ò³A'P[ÛÓŠ ¯„†1ôÝ' 08:00:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x8) [ 1603.680394][T25958] 9pnet: Insufficient options for proto=fd [ 1603.703838][T25960] 9pnet: Insufficient options for proto=fd 08:00:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_ENDIAN(0x14, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x2, 0x14, 0x7f, 0x6, 0x10, 0x0, 0x70bd2b, 0x25dfdbff, [@sadb_address={0x3, 0x6, 0x2b, 0x20, 0x0, @in={0x2, 0x4e20, @broadcast}}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d5}, @sadb_sa={0x2, 0x1, 0x4d3, 0x4, 0xff, 0xf4, 0x3, 0xa0000000}, @sadb_sa={0x2, 0x1, 0x4d4, 0xfb, 0x3, 0x68, 0x3, 0x1}, @sadb_address={0x3, 0x5, 0x33, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d2}]}, 0x80}}, 0x4000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c63616368657461673d0f"]) 08:00:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000600000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x181, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_qrtr_TIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xb) 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000800000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r6, 0x3, 0x7f}, 0x8) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x8880, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r7, 0x10f, 0x85) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r8, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) [ 1603.933399][T25978] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000ffff800000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1603.975263][T25978] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:06 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x3, 0x7, 0x0, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1ff}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xfff}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x6}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x10000}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8001}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x40) 08:00:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KDADDIO(r5, 0x4b34, 0x3) [ 1604.054082][T25978] Error parsing options; rc = [-22] 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000a00000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socket$qrtr(0x2a, 0x2, 0x0) 08:00:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000040)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000100000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1604.282524][T25998] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x80000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)=0x7f, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000000)=""/47, &(0x7f0000000040)=0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f0000001400)={@rand_addr, 0x0}, &(0x7f0000001440)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x3, 0x0}}}, 0xe8) [ 1604.322315][T25998] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:06 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = openat2(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x280080, 0x40, 0xa}, 0x18) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'geneve1\x00'}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000140)={0x4, 0x80, 0x1ff, r4, 0x0, &(0x7f0000000100)={0x9909d4, 0x0, [], @value64=0x3}}) mkdirat(r5, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x80000, 0x0) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f00000001c0)) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r9 = dup(r8) r10 = socket$rxrpc(0x21, 0x2, 0x0) tee(r0, r10, 0xfffffffffffffff9, 0xe) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r9, @ANYBLOB="2c63616368657461673d0f"]) [ 1604.358868][T25998] Error parsing options; rc = [-22] 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000200000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYRES32=r4]) 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000300000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:06 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) recvfrom$x25(r2, &(0x7f0000000100)=""/246, 0xf6, 0x101, &(0x7f0000000040)={0x9, @remote={[], 0x1}}, 0x12) 08:00:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {0x0, 0x0, 0xb0}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1604.544046][T26022] 9pnet: Insufficient options for proto=fd [ 1604.578683][T26026] 9pnet: Insufficient options for proto=fd 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000400000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ext2\x00', 0x2010002, &(0x7f00000000c0)='\x00\x00\x00\x00\x9e') getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000340), &(0x7f0000000380)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="4c0000006d00050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002c0034801400360064756d6d79300000000000067fad6a001400350069703667726530000000000000000000301e62e8b1aba0429de4facc0ed647ef410b1eb8129b2ec494600b4f4ea5a87c17dd978b97219a0ffd60c5043eed9e0a247408afc812fde971dd4df02e143513592b6a555eafe9239ef4566cfe64c969bc1eeccfb1305ca8492d09e598027d63ffb526e1df2dbf2dd60856c3daf7c0ad8501cfce264d43dcfd"], 0x4c}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000140)={0x4, 0x800000, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x980903, 0x9, [], @string=&(0x7f0000000100)=0xff}}) ioctl$SNDRV_PCM_IOCTL_DELAY(r5, 0x80084121, &(0x7f0000000180)) r6 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffb, 0x0, 0x1}) msgctl$MSG_INFO(r6, 0xc, &(0x7f00000002c0)=""/90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r8, 0xc02c5341, &(0x7f0000000240)) 08:00:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c0000006d00050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002c0034801400360064756d6d7930000000000000000000001400350069703667726530000000000000000000da7d7057a6ca54fd40b2786d1899670758885e3529adb09586bdbcefa0196dc48ffeb62e184bd557d8860bd59d218644e7cb246046b38350def6bd070bd02f7f3d91b21ce1e9cdade607c3edf73d14e84b422333ca62e59a17a0d57ff55a12b9b59d4c115de037da31499c1e5293f3c9d9babded678dc14d787675821e4aa48fda90daed63421dd1b7a6a3a8b048883fd3767678bd404afcb82c"], 0x4c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140080003e00000426bd7000fcdbdf250a0000004d97da4ebccc2ddf2ec0cb53466c8fbfd790a005df59fb7ddfb92f2ca276cb6fe4504b759c5929f5688fee3cb9a6e2e62c36b66a4cb3b47a4cd608f75d847bb431d7b7135f74c7d4edf375d9b2908a7417b6974a67c5"], 0x14}, 0x1, 0x0, 0x0, 0xc0627b48bda20258}, 0x0) connect$inet(r0, 0x0, 0x0) r5 = socket(0x400000000000010, 0x3, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = socket$inet6(0xa, 0x2, 0x401) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000500000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) renameat(r2, &(0x7f0000000280)='./file0\x00', r4, &(0x7f00000002c0)='./file0\x00') r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x9b0000, 0x62e87467, 0x5, r5, 0x0, &(0x7f0000000140)={0x9909d8, 0x8000, [], @p_u16=&(0x7f0000000100)=0x6}}) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040)={r11}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r9, 0x84, 0x11, &(0x7f00000001c0)={r11, 0x1f}, 0x8) 08:00:06 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) accept4$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none}, &(0x7f00000002c0)=0x38, 0x81000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000100)={'vxcan1\x00', {0x2, 0x4e22, @broadcast}}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000080)={0x0, 0x4, 0x4, 0x8001}) r7 = dup(r4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000280)) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c0000006d00054718d66d0000000064136e0000", @ANYRES32=r8, @ANYBLOB="00020000000000002c0056801400360064756d6d7930120000000000000000001400350069703667726530000000000000000000"], 0x4c}}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000200)={0x1, 0x1, 0x1000, 0x32, &(0x7f0000000180)="fff057b55b5a1f75a9890d04cea88dd2fab272fa0855c9c963ece24ec421f1865d369cfa90cfe9df64c0f8383ef47040961a", 0x3f, 0x0, &(0x7f00000001c0)="4cf1335e66e005395fcee039a11ea324b23e39911e1d354bf50c393b5f53a50799a73ff2817eeffb92ca47a27c76b77637d35f2db82c311bcba4aecdd2cdab"}) 08:00:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000600000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:07 executing program 0: connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x400000000000010, 0x3, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), 0xffffffffffffffff, 0x1}}, 0x18) ioctl$PPPIOCDISCONN(r2, 0x7439) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000002040)=[{&(0x7f0000000040)=0x1, 0x1}, {&(0x7f0000000080)=0x2, 0x1}, {&(0x7f0000000100)=0x2}, {&(0x7f0000000140)=0x1}, {&(0x7f0000000180)}, {&(0x7f00000001c0), 0x2}, {&(0x7f0000000200)=0x2, 0x1}, {&(0x7f0000000240)=0x1, 0x1}, {&(0x7f0000000580), 0x2}, {&(0x7f00000005c0)=0x1}, {&(0x7f0000000600)=0x2}, {&(0x7f0000000640)=0x5, 0x2}, {&(0x7f0000000680), 0x1}, {&(0x7f00000006c0)=0x2}, {&(0x7f0000000700)=0x2, 0x1}, {&(0x7f0000000740)=0x2, 0x2}, {&(0x7f0000000780)=0x2, 0x2}, {&(0x7f00000007c0)=0x2}, {&(0x7f0000000800)=0x1}, {&(0x7f0000000840)=0x2, 0x2}, {&(0x7f0000000880), 0x1}, {&(0x7f00000008c0)=0x1, 0x2}, {&(0x7f0000000900), 0x1}, {&(0x7f0000000940)=0x1, 0x1}, {&(0x7f0000000980), 0x1}, {&(0x7f00000009c0)=0x1}, {&(0x7f0000000a00)=0x1}, {&(0x7f0000000a40), 0x2}, {&(0x7f0000000a80), 0x2}, {&(0x7f0000000ac0)=0x1, 0x1}, {&(0x7f0000000b00), 0x2}, {&(0x7f0000000b40)=0x1, 0x2}, {&(0x7f0000000b80)=0x2}, {&(0x7f0000000bc0)=0x2}, {&(0x7f0000000c00)=0x2, 0x2}, {&(0x7f0000000c40), 0x1}, {&(0x7f0000000c80)=0x1, 0x1}, {&(0x7f0000000cc0)=0x1}, {&(0x7f0000000d00)=0x2, 0x1}, {&(0x7f0000000d40)=0x2}, {&(0x7f0000000d80)=0x1, 0x2}, {&(0x7f0000000dc0)=0x1}, {&(0x7f0000000e00)=0x1, 0x2}, {&(0x7f0000000e40), 0x2}, {&(0x7f0000000e80)=0x1}, {&(0x7f0000000ec0), 0x2}, {&(0x7f0000000f00)=0x1, 0x1}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)}, {&(0x7f0000000fc0)=0x2, 0x9}, {&(0x7f0000001000)=0x1, 0x1}, {&(0x7f0000001040)=0x2, 0x2}, {&(0x7f0000001080), 0x2}, {&(0x7f00000010c0)=0x2, 0x2}, {&(0x7f0000001100)=0x1, 0x2}, {&(0x7f0000001140)=0x1, 0x1}, {&(0x7f0000001180)=0x2, 0x2}, {&(0x7f00000018c0), 0x2}, {&(0x7f0000001200)=0x2}, {&(0x7f0000001240), 0x1}, {&(0x7f0000001280)=0x2}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=0x1, 0x1}, {&(0x7f0000001340)=0x1, 0x2}, {&(0x7f0000001380)=0x2, 0x1}, {&(0x7f00000013c0)=0x2, 0x2}, {&(0x7f0000001400)=0x1}, {&(0x7f0000001440), 0x2}, {&(0x7f0000001480), 0x1}, {&(0x7f00000014c0)=0x2, 0x1}, {&(0x7f0000001500), 0x2}, {&(0x7f0000001540)=0x1, 0x2}, {&(0x7f0000001580)=0x2, 0x1}, {&(0x7f00000015c0)=0x1, 0x2}, {&(0x7f0000001600)=0x1}, {&(0x7f0000001640)=0x1}, {&(0x7f0000001680)=0x2}, {&(0x7f00000016c0)=0x1, 0x1}, {&(0x7f0000001700)=0x2, 0x2}, {&(0x7f0000001740)}, {&(0x7f0000001780)=0x201, 0x2}, {&(0x7f00000017c0), 0x1}, {&(0x7f0000001800)=0x1}, {&(0x7f0000001840), 0x1}, {&(0x7f0000001880)=0x1, 0x2}, {&(0x7f00000027c0), 0x1}, {&(0x7f0000001900)=0x2, 0x1}, {&(0x7f0000001940)=0x1}, {&(0x7f0000001980)=0x2}, {&(0x7f00000019c0)=0x1, 0x2}, {&(0x7f0000001a00)=0x1, 0x2}, {&(0x7f0000001a40)=0x2, 0x1}, {&(0x7f0000001a80)=0x1, 0x2}, {&(0x7f0000001ac0), 0x2}, {&(0x7f0000001b00)=0x1}, {&(0x7f0000001b40), 0x1}, {&(0x7f0000001b80)=0x2, 0x1}, {&(0x7f00000011c0)=0x1, 0x1}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)}, {&(0x7f0000001c80), 0x1}, {&(0x7f0000001cc0)=0x2, 0xfffffff8}, {&(0x7f0000001d00), 0x1}, {&(0x7f0000001d40), 0x2}, {&(0x7f0000001d80)=0x2}, {&(0x7f0000001dc0)=0x2, 0x1}, {&(0x7f0000001e00)=0x2}, {&(0x7f0000001e40)=0x1, 0x1}, {&(0x7f0000001e80)=0x1, 0x2}, {&(0x7f0000001ec0), 0x1}, {&(0x7f0000001f00)=0x1}, {&(0x7f0000001f40)=0x2, 0x4}, {&(0x7f0000001f80)=0x2}, {&(0x7f0000001fc0)=0x1, 0x1}, {&(0x7f0000002000)=0x2, 0x1}], 0xd, 0x73, &(0x7f0000002780), 0x0, 0x0) 08:00:07 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r0, 0x80084121, &(0x7f0000000080)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000700000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$smackfs_ptrace(r5, &(0x7f0000000000)=0x2, 0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7ffb}) 08:00:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000800000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r1, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x20}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = getpid() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r5, 0x0) sendmsg$netlink(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = getpid() r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xb) setresgid(0x0, r10, 0x0) sendmsg$netlink(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r8, 0x0, r10}}}], 0x20}, 0x0) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x6}, [{0x2, 0x7}, {0x2, 0x6}, {0x2, 0x1}, {0x2, 0x3}, {0x2, 0x3}, {}, {0x2, 0x5}], {0x4, 0x4}, [{0x8, 0x5}, {0x8, 0x2, r1}, {0x8, 0x0, r5}, {0x8, 0x4, r6}, {0x8, 0x5, r10}], {}, {0x20, 0x1}}, 0x84, 0x2) 08:00:07 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 08:00:07 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f00000001c0)='./bus/../file0/file0\x00', 0x2, 0xcc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r3, 0x0, 0x200, 0x0) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r5 = dup2(r4, r3) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0x20}, 0x20) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, 0x0, 0x0) r7 = socket(0x400000000000010, 0x3, 0x0) write(r7, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r8 = socket$inet6(0xa, 0x2, 0x0) dup(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) [ 1605.272705][T26073] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1605.303004][T26073] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1605.324001][T26073] Error parsing options; rc = [-22] [ 1605.344872][T26073] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1605.372420][T26073] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1605.393637][T26073] Error parsing options; rc = [-22] 08:00:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="747261f4757e8d966400000000000000040800dbed44380286519a4faa9a87754e6b23b38d2e03c83ea9a62aa203957a156675411b61fa6f68af49cd982dbab782cecec5fa3c35", @ANYRESHEX=r0, @ANYBLOB="2c7766e46e6f3d", @ANYRESHEX=r2, @ANYBLOB="2c63617768657461673d0f"]) 08:00:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x8002, {0x0, 0x0, 0x7, 0x0, 0x2}}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x4002) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000080)) 08:00:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000900000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000000)) socket(0x400000000000010, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) write(r2, &(0x7f0000000380)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be038201428587722006f8ea475cffe9e3888f5fbde00dd727260f65d53ce47d9b2019faa3e1060f4bfb8df2c73f5348c01d3e9161e7ddc489a1cdd6cfdf1e5e74a5af99a8daca2d0dc5b7edbcb37f71ae79540ffeb0a4c3b18eec1dc19e6e5bbe462b226f83fd92e7fadfc7a37bad0afe8858799994c4cc8666f05b7f40bf551cc83b473fb907e29c74f960b1852ff1e9daf51567c9959a1781557fe2d6b5ff24422793280d6c5bb229a75d1cf2bdfecbdab8825666db34d106b28e850d746a01c", 0xe4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r8, 0x10f, 0x85) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x4e24}, {0x0, 0x0, 0x9}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') add_key$user(0xfffffffffffffffe, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="682c4ebeab691112627b", 0xa, 0xffffffffffffffff) 08:00:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x6fff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}) [ 1605.721943][T26090] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1605.749114][T26090] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000a00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x150) getsockopt$inet6_dccp_int(r3, 0x21, 0x6, &(0x7f0000000080), &(0x7f0000000200)=0x4) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000100)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) read$eventfd(r4, &(0x7f0000000000), 0x8) [ 1605.821343][T26090] Error parsing options; rc = [-22] 08:00:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socket$isdn_base(0x22, 0x3, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getpeername$tipc(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c63616368657461673d0f"]) 08:00:08 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) accept4$inet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x100000) 08:00:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000b00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000100)={0x5, 0x5, 0x7, {0x20, 0x2}, 0x5, 0x4}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8dac229622a0af4f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x1b02402, &(0x7f00000000c0)='$') 08:00:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000c00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='vxfs\x00', 0xf000f, &(0x7f00000000c0)='U\xd3\x9d\xc5\xd8\x94\xce\"F\x18\xa6\xb2\xa2o\xee-e\xcf\x03\x92\xeb\x81\nM{\xe1\x00XF\x96\xe5v\xf8\x01Rac\xa8F+\xf5T3\xfdb_\x1a\b\x19\xbc\x18\xfa\x06\xbb)\xd7m\x18\x0e\xb4\xd6@\x00'/78) 08:00:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000d00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.SMACK64EXEC\x00', &(0x7f0000000300)={'ip6gre0\x00'}, 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r4, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0x31}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040010}, 0x4000000) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000340)={0x1, 'ip_vti0\x00', {}, 0x4577}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = dup(r6) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB="2c63616368657461673d0f"]) 08:00:08 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffb}) msgsnd(r3, &(0x7f0000000180)={0x1, "4a995aa70914e283b57c239cd987770c03702cd0c822d2a072bb865e43868a3b89a98ef4ce53e62ffb93ef9ba9daf1b2bf85f77943f610e30f2555207fb4b74b115b9dcb235300b8a98127203f23e3a474a17a386cdba380463b3b8587dd6080a453c7c5c6b4f8b5075f33c2f258569bb5cd59cdd9d1251dcd70d8579d8f16ae6afd3cb34ece198799a5f3817b471620dd44ebf2564cdc0d2c0f4bc1a3ece97d575dadfdb37abbfedf592289eae9c1b06e3d12b9e833495cd1103b87d0fc2eb9dfbd5b8046a03f0d429f3806b0c0177bffdd5ad2ba7092035d2b9c3a3cd6c91b8cc30ce32ff10ecb21fce8f78c23fc8a2e71a2f6a90add4b82"}, 0x101, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000040)=0xfffffffb) 08:00:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fspick(r1, &(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VHOST_GET_VRING_BASE(r5, 0xc008af12, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000100)="110cafe46f2d57a428c46722bc5806c3", 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r4, 0xc0984124, &(0x7f0000000100)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1606.280407][T26134] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1606.304706][T26134] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1606.351984][T26134] Error parsing options; rc = [-22] 08:00:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40703, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000040)=0x7) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote, 0x0, 0xff}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:09 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/../file0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$FUSE_OPEN(r1, &(0x7f0000000100)={0x20, 0xfffffffffffffff5, 0x3}, 0x20) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup(0xffffffffffffffff) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x184, 0x0, 0x300, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x184}}, 0x4048884) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x1412, 0x281b2e16b68c25e5, 0x70bd2b, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000806}, 0x8010) 08:00:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_UNLOCK(r2, 0xc) r3 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c63616368657461673d0f"]) 08:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000e00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1606.885483][T26153] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000f00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1606.933896][T26153] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$TIOCSCTTY(r5, 0x540e, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f", @ANYRES32=r4]) rmdir(&(0x7f0000000100)='./file0\x00') 08:00:09 executing program 4: bind$isdn(0xffffffffffffffff, &(0x7f0000000100)={0x22, 0x4, 0x5, 0x4, 0x81}, 0x6) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x400000, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000080)={0x5, 0x20, 0x2, 0xce, 0x80000001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x9, {0x0, 0x7, 0x200000, 0xfffffffb, 0x40000}}) [ 1606.991421][T26153] Error parsing options; rc = [-22] [ 1607.039417][T26165] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000001000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1607.079388][T26165] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1607.151275][T26165] Error parsing options; rc = [-22] 08:00:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) fcntl$setlease(r1, 0x400, 0x1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffff}}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000100)={0x3, 0x8, [{0x5, 0x0, 0x24a}, {0x1, 0x0, 0xfffffffffffff51c}, {0xfffffffd, 0x0, 0x200}]}) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0xfffffea4, 0x6d, 0x705, 0x70bd29, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000040)={0x3, 'ipvlan1\x00', {0x9}, 0x5}) 08:00:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616300000000a7d961673d0f"]) 08:00:09 executing program 2: r0 = openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x294000, 0xc4, 0x4}, 0x18) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000140)={0x100000, 0xf000, 0x755a, 0x5, 0xfc6}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000001100000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1607.313655][T26187] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x7, {0x1}}, 0x18) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000001200000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1607.370262][T26187] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x108) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x14, r3, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x7c, r3, 0x100, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x89}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x4) [ 1607.442043][T26187] Error parsing options; rc = [-22] 08:00:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 08:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000001800000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='qnx4\x00', 0x40009, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0xffff, 0x6, &(0x7f0000000500)=[{&(0x7f0000000200)="fd19325106595e5dee828830f763312835f42e36bb79376116fbf176c7e07ec27ec4fd009e158d80a17e553b3b5ba6aad7ad2c1dceb68dc745a66889b3d7159cd3d545", 0x43, 0x1}, {&(0x7f0000000280)="1e2788662f577ebf4986ee2a7adc342a2dad68ae0cf15653fa9c05f58caf6fd9ff79852b74c28d57d4bbf6463bc444c97e552d129e74fc43f3003bea3c112555849c0559854fcbf61950137e67fafd1d97c8d0b90375c7cc9ef484c0fdfeb8691118a589b83d47644c788eea47b4297f1c0d9ff162e3ef882227dcd9fd8b4629924c70637faa0c883833777229670ffb0af8512ca3905176496314b689f1a920d8de44e738cd10b525d0a9c784af63", 0xaf, 0x1}, {&(0x7f0000000340)="97dfdb6e6ca41ebed0089233cd833e541e0b9ea90cc3f856af50d9037960efa93ab38eadfd52bbda02ed47d67b5d3b97acef00d8180c2084566ae7a2dca635ef174427fcda6866a8d98662b37d68ef56d4a86047c5e740bace66648ba27fac4a594904a6a2836f8beb8c57cf89b77eba3785c9", 0x73, 0xfffffffffffffffc}, {&(0x7f00000003c0)="d3dfd6a901aa59c5ba1f6f147a93a07694cd0c649e1d3f02d6e9da32320151fc2268ad0321875fde5c41e87d5638661b5b66c37002eb0b46524aba82e098fa703a80545b694c37993b26c58bf5bd5f26c83e4a1634d4b4fa192668023a46ca2d479b85747397335e9d", 0x69}, {&(0x7f0000000440)="01ada54ec761986ac9cd026f24b26e22a841396d22c4dcad3eb7ac377910287c08dfa3c9415e5250ce330c531f04561eb7fdf98c2ce5c34b921bba10d4ad5311741781c6f4f66f2ac84a37299a7928338844a702720bc059276836d67e2fd4e6d2f0a604ea81d97cacece2c621ed8a5f5d7503abec6f06f967a023452f", 0x7d, 0x100}, {&(0x7f00000004c0)="8880c020d9e48586dd031faf0879fd7e35866864862111260423a52f858081afd6769471ac375a21fb29296ce2a8377462e51b99c7f6abe21f798489980482", 0x3f, 0x6}], 0x84a010, &(0x7f0000000600)=ANY=[@ANYBLOB="757365725f78617474722c6572726f72733d72656d6f756e742d726f2c7365636c6162656c2c646fbf3bb453dbdcbe1277c76e745f686173682c00"]) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x20) 08:00:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$HIDIOCGRDESC(r5, 0x90044802, &(0x7f0000000380)={0x366, "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"}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000001f00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:09 executing program 5: clone(0x804100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.sched_load_balance\x00', 0x2, 0x0) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x400500, 0x0) sendto$l2tp(r5, &(0x7f0000000140)="5e6c315ba8035c454d95946101ceb27312cbc76771c06f47a231d59ec98aae92826bf142d7a9337df300472c42c0cf644b11f83d419ae4d45bdd0a79fcef849364e6067eba0850fec6105898dda2d10f69666043fa8821c740bb0a678c8ebe4f2da5b897f1a2b80cb14f1379caa3ad8292cd5be6c78a95a86d7f7641104f0558fd4917055436e8ece3f32eee06e98f9fe81eb138bc5c216f0e6d3be29f5cecd17a807f2d0ea7b0ea52ab4ba54e0d156e04f6287a212a170a598b8b7c198e13c9b91ef89160e8b760afce856ff3", 0xcd, 0x2, &(0x7f0000000280)={0x2, 0x0, @private=0xa010101, 0x2}, 0x10) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 08:00:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(r1, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180)={{r2, r3/1000+60000}, {0x0, 0xea60}}, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000040)='$') 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000002000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1607.847392][T26229] rpc_pipefs: Unknown parameter '$' [ 1607.880944][T26233] rpc_pipefs: Unknown parameter '$' 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000032000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r3, 0x905, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xac, r3, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0xac}, 0x1, 0x0, 0x0, 0x404c800}, 0x24048095) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$SO_J1939_SEND_PRIO(r6, 0x6b, 0x3, &(0x7f0000000240)=0x5, 0x4) 08:00:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, 0x0, 0x0) r4 = socket(0x400000000000010, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_0\x00', r2}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000640)={'syztnl2\x00', &(0x7f00000005c0)={'ip6gre0\x00', r5, 0x29, 0x80, 0x7, 0x3, 0x41, @remote, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x1, 0x8, 0x0, 0x1}}) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=@ethtool_cmd={0x47, 0xf00, 0x1, 0xf57, 0x8, 0x5, 0x2, 0x20, 0x6, 0x8, 0x5, 0x5, 0xfff, 0x0, 0x80, 0x3, [0x9, 0xfff]}}) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000002400000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:10 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x8, 0x800}}) 08:00:10 executing program 2: mkdir(&(0x7f0000000040)='./file0/file0/file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = fcntl$dupfd(r0, 0x406, r2) sendmsg$AUDIT_USER_TTY(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xb8, 0x464, 0x100, 0x70bd2a, 0x25dfdbfb, "c150e45ef4ca90e4fc66fe72449814498bc41db5898d731086eb07df24ba01dcaedefc0a7cccb827a6a987aee886558786cc04107ac88372f2efc4a90c5df41ccc5167361e1ee1bf58b8671186cb3788f1215ae9ec4153c3acad662aaa558c188e47d710c5529dca353da885a0c6f72ada7288f1623894b8d67b120be5b7478cc101b983ab6fdb156c19a55612ccbd787d62a31819e23258f38c7f1a7bca397a81eb24b90d080b14", [""]}, 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0xc000) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000001c0)=@req={0x400, 0x4, 0x9, 0x1}, 0x10) 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000002500000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, {0x4}}, {{@in6=@remote}, 0x0, @in6=@empty}}, 0xe8) 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000002c00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x101) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$snddsp(r4, &(0x7f0000000100)="538fedbfab3b2c42b2d6fd253c2ba18bb473abd194cdd24af9bb1eafde8f3675b26f008dc3a531bdb94cf5b937524dc24975495fd5138cdfdbb0564361692d00dba0ba8b3c5abad1d4e9d8c411491fc5440302eaf9766cc21c202a41269916a7a84913276ee8b9c9382e58e61236b22805bd1b20853da9b3d298d35b3312644538671a627fde8a1e87b125f5df0f6fb793e1d212445204a42da7840957b5dec7434e597719f5f834ad360f2d583f352506147a1a3a122d06f66e6f872e7d17927fbb867d8e1023621d6e89cefad73b810bad37dc58d0291d7dc26d5585af2fe4d4c0681b38758dc4fb58329f956e2207", 0xf0) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000033600000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r7, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r8}) keyctl$KEYCTL_MOVE(0x1e, r6, 0xffffffffffffffff, r7, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000340)) keyctl$unlink(0x9, r5, r7) keyctl$update(0x2, r8, &(0x7f0000000300)="c3133856ab330b75cac782188a519d4a867f45a8cc638aed", 0x18) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$IPSET_CMD_TEST(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0xe0, 0xb, 0x6, 0x201, 0x0, 0x0, {0x9d9cbcd677e2b474, 0x0, 0x6}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_DATA={0x64, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, @IPSET_ATTR_ETHER={0xa, 0x11, @local}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x8}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x20}, @IPSET_ATTR_IFACE={0x14, 0x17, 'geneve1\x00'}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffc}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x6}}]}, @IPSET_ATTR_ADT={0x38, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'lo\x00'}}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4041}, 0x20048c0) r9 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r9, @ANYBLOB="2c63616368657461673d0f"]) [ 1608.392773][T26259] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1608.404158][T26259] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:10 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x18, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x4}]}, 0x18}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x2cc, r6, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x7}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x200, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x128, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '##}--,:[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1a}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffd}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '({\\\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '{*#&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0xd0, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '&{\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '--()\'\'\x80\\+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1fc0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/uinput\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb218}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}]}, {0x4}]}]}, @ETHTOOL_A_EEE_HEADER={0xa0, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}]}, 0x2cc}, 0x1, 0x0, 0x0, 0x80}, 0x800) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000040)={0x80, 0x0, 0x7f, 0x401}) 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000003c00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1608.473259][T26259] Error parsing options; rc = [-22] 08:00:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000600)={0x0, {}, 0x0, {}, 0x7f, 0x1, 0x13, 0x8, "5fe434d9fb255c2df6b0ea2888e0f2c2505aa68165079e8cc96d22869fbf94a1c199774ac5fc30acaaa12c7f57fd616cd94d6bccdf69af5ae9d2533d00", "01c102220ec493a8df65c8c8bff9afd3367f8915176b3cbf98f1dcaf49ce2534", [0x3, 0x3]}) r2 = syz_open_dev$video4linux(&(0x7f0000000580)='/dev/v4l-subdev#\x00', 0x3fbb6ad8, 0x105700) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f00000005c0)) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000240)={0x33, 0x1c, [], [@generic={0x7f, 0xd7, "208e9bb1c05523cf0cb59611075494ab524624ef4d0b4b98118eb80a12fdb632a4124ce677e0629e806c5f6874b6122017c6630f605d3e5249341b1705e156904738b1202167259fcfad273aef6861084e1bf8bb060ca2c2977bc131297c8a9175ea586b98f3c064fa7b75633755fbf287e029d446f46bfa51b70cc34b33de06f8c35ab97f4cf71acafc88793a0b41b08e7976a1fada816cbbd148102ec6fc25dcf9e782ce9ce2931acc59a8a999a544bc3b6d2779f686b249b88121b6f7b18b4a78f97d8cb434d9b660e37b599890c081a18ae3529302"}, @ra={0x5, 0x2, 0x1ff}, @pad1, @enc_lim={0x4, 0x1, 0x81}, @enc_lim={0x4, 0x1, 0x7}]}, 0xf0) set_robust_list(&(0x7f0000000200)={&(0x7f0000000100)={&(0x7f00000000c0)}, 0x5, &(0x7f00000001c0)={&(0x7f0000000140)}}, 0x18) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0xc0000000) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000400)={@ethernet={0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd}}, {&(0x7f0000000380)=""/37, 0x25}, &(0x7f00000003c0), 0x31}, 0xa0) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, &(0x7f0000000340)) 08:00:10 executing program 0: connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x400000000000010, 0x3, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000001c00)=ANY=[@ANYBLOB="0000000064eec455c262f5fa276f7752df3c7a2f6a4941dced8d4bdb18fa64172fdf456e9ffb2015ab6f13fabce4dd0c06545cbb95f3973737bb1c0fc6f2514712501a9f4b88e68439bb695d1aea3c1ee8e91faa778d84391bf300b316bf6bf2f8147a37e73436cbba61c529833fa0da2a511a1184c19331d8ae14bf8131958d26be05c7e9919902d25910e26e6fc9fff57cd47f77045e1c9c4ab76f19f4a794404ec2181783c4acc6b5e3c7ddca5c60b134960558c9182bb90c78e67b6ad90ce36fee808864bad7c7aba54574d139c87a645369fa460a5be96ad5dff39be6a66009334086763661824df0a2f3005feaf6d8", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001940)={r4, 0xf3d}, &(0x7f0000001980)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000019c0)={0x8, 0x1}) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$BLKPBSZGET(r6, 0x127b, &(0x7f0000001900)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r7, 0xc0186419, &(0x7f0000000240)={0x9, &(0x7f0000000380)=""/4096, &(0x7f0000001b00)=[{0x5, 0x9b, 0x4a1, &(0x7f0000000100)=""/155}, {0x2, 0x57, 0x110, &(0x7f0000000040)=""/87}, {0x4, 0xed, 0xff, &(0x7f0000001380)=""/237}, {0x40, 0x72, 0x5, &(0x7f00000001c0)=""/114}, {0x1000, 0xca, 0x1, &(0x7f0000001480)=""/202}, {0x8, 0x95, 0x7, &(0x7f0000001840)=""/149}, {0x1, 0xed, 0x1f, &(0x7f0000001640)=""/237}, {0xdf, 0xc3, 0x81, &(0x7f0000001740)=""/195}, {0x4, 0xf8, 0x0, &(0x7f0000001a00)=""/248}]}) 08:00:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000003f00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2000, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r2, 0xac, "26a53ade713c2cfb540af23dd46d913cd600b2bc3bec71da89d8814890b2180f494cc5c31657cf975bc4dc0d71c62741c47a162a9476752988b5b5131f9c0e6fd1cb0321508d0a8d3c9a51d39f0b6d9a58ea5ef6fac2f0f1515fde0cbab8aed3d63c9fc6e8560912c97e3193eee686cdc1616ba1c5375cb5939f4a618359b0e1934eb1cebaa0751f30e67c14e8f6e2ddf3b89f3cde3d1e2ab4da465a9e6e5a52023a0db6d5ed8f9fa2e3ab4b"}, &(0x7f0000000080)=0xb4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, @none}, 0x8) 08:00:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000280)="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") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) faccessat2(r4, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = dup(r6) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB="3f63613d02400000000200"]) 08:00:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000004000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1608.851091][T26288] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1608.889038][T26288] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1608.891190][T26292] 9pnet: Insufficient options for proto=fd [ 1608.939072][T26288] Error parsing options; rc = [-22] 08:00:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000024000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000004800000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = msgget$private(0x0, 0x400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x8, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3c}}, r6}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x200, @dev={0xfe, 0x80, [], 0x34}, 0x6}, {0xa, 0x4e21, 0x3df2, @private0, 0x9}, r6, 0xc675}}, 0x48) msgsnd(r2, &(0x7f0000000100)={0x3, "5f55e6aca4b4abf19292065318a824"}, 0x17, 0x800) r7 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB='=\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r7, @ANYBLOB="2c63616368657461673d0f"]) ioctl$SNDRV_PCM_IOCTL_XRUN(r7, 0x4148, 0x0) 08:00:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000004c00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0xc4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) faccessat2(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)={0x1c, r5, 0x1, 0x0, 0x0, {0x2}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r5, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x8}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x484}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r10 = openat$cgroup_ro(r3, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r10, 0x112, 0xc, &(0x7f00000001c0)=0x1, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c77660399c46ead872b6007646e793d", @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) [ 1609.275225][T26302] 9pnet: Insufficient options for proto=fd [ 1609.303147][T26305] 9pnet: Insufficient options for proto=fd [ 1609.308227][T26309] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1609.337138][T26309] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1609.383014][T26312] 9pnet: Insufficient options for proto=fd [ 1609.386053][T26309] Error parsing options; rc = [-22] [ 1609.403472][T26314] 9pnet: Insufficient options for proto=fd 08:00:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x10) 08:00:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000005200000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) accept4$unix(r4, &(0x7f0000000280), &(0x7f0000000080)=0x6e, 0xc00) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000180)={r6, @in={{0x2, 0x4e20, @rand_addr=0x64010101}}, 0x8000, 0xdad}, 0x90) r7 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYRES64, @ANYRES64=r10]) 08:00:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x82) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x220080, &(0x7f00000000c0)='$') 08:00:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000006800000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1609.770740][T26331] 9pnet: Insufficient options for proto=fd 08:00:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.SMACK64EXEC\x00', &(0x7f0000000300)={'ip6gre0\x00'}, 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r4, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0x31}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040010}, 0x4000000) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000340)={0x1, 'ip_vti0\x00', {}, 0x4577}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = dup(r6) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB="2c63616368657461673d0f"]) 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000006c00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1609.829112][T26333] 9pnet: Insufficient options for proto=fd 08:00:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000140)={0x7ff, 0x200, {r4}, {r6}, 0x9, 0x9}) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="25000000370200029f043a85ffffffff0500000000000000", @ANYRES32=r7, @ANYBLOB="07002d21242bff0721"], 0x25) r8 = dup(r1) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0xc000, 0x0) ioctl$PIO_FONTRESET(r9, 0x4b6d, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c63616368657461673d0f"]) 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000007400000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000000)={0x3c, @rand_addr=0x64010102, 0x4e22, 0x3, 'lblc\x00', 0x0, 0x20, 0x56}, 0x2c) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r11, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r11, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x6, 0x3, 0xfffffffe, 0x6}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000090}, 0x1) 08:00:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xe2I\xd9\xc1\xc9\xac#\xf7{\xf4\xed?\x17\x0eR\x00\xf0\x8e\\\x97\x04\x80\xa48\xb7\xc9q\xbbO\xab\xe6\xbe\x00'/46) 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000008fa7500000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/ip6_mr_cache\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x3238, @mcast2, 0x4}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @local}, 0x300}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in6={0xa, 0x4e21, 0x8, @mcast1, 0x3f}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x39}, 0x4}], 0xb0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c63616368657461673d0f"]) [ 1610.175183][T26352] ecryptfs_parse_options: eCryptfs: unrecognized option [³âIÙÁɬ#÷{ôí?R] 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000007a00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1610.230476][T26352] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000100)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'ip_vti0\x00', r7, 0x40, 0x7, 0x8001, 0x113, {{0xd, 0x4, 0x2, 0x5, 0x34, 0x65, 0x0, 0x7, 0x2f, 0x0, @remote, @rand_addr=0x64010101, {[@lsrr={0x83, 0xf, 0x9c, [@broadcast, @remote, @loopback]}, @lsrr={0x83, 0xb, 0x37, [@broadcast, @multicast2]}, @ra={0x94, 0x4}]}}}}}) [ 1610.279469][T26352] Error parsing options; rc = [-22] 08:00:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x51f, 0x4) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c63616368657461673d0f"]) 08:00:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f00000001c0)={0x60, 0x480, 0x226, 0x600, 0x5, 0x40, 0x18, 0x1, {0x8e, 0xfff}, {0xa356, 0x800, 0x1}, {0x4, 0xfffffff8, 0x1}, {0x2, 0x0, 0x1}, 0x2, 0x100, 0x1, 0x3, 0x1, 0x4, 0xb0000000, 0x8000, 0x2, 0x5, 0x41490000, 0x4, 0x20, 0x0, 0x0, 0x7}) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000ffffff8500000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1610.458445][T26368] ecryptfs_parse_options: eCryptfs: unrecognized option [$] 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000ffffff9c00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f0000000100)={'veth1_to_bond\x00', 0x3}) r6 = dup(r4) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e20, 0x8000, @dev={0xfe, 0x80, [], 0x36}, 0x9}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e20, 0x200, @dev={0xfe, 0x80, [], 0x43}, 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e23, 0xfff, @local, 0x6}], 0x94) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1610.498451][T26368] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 08:00:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x3, 0x101000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x591e, 0x4) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c63616368657461673d0f"]) [ 1610.562409][T26368] Error parsing options; rc = [-22] 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000ffffff9f00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)={0x1c, r4, 0x1, 0x0, 0x0, {0x2}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x80, r4, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_batadv\x00'}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x1}}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x4}}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'team_slave_1\x00'}, @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'netpci0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8}, 0x44880) r5 = dup(r0) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$CHAR_RAW_SECDISCARD(r5, 0x127d, &(0x7f00000000c0)=0x9) mkdir(&(0x7f00000002c0)='./file0\x00', 0x78) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, &(0x7f0000000040)='$') 08:00:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000003b400000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0xe4, r3, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xd0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb2af}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x43, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8000}, 0x4040000) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_PCM_IOCTL_STATUS32(r7, 0x806c4120, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$TIPC_IMPORTANCE(r9, 0x10f, 0x7f, &(0x7f0000000380)=0x8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1610.724865][T26390] ecryptfs_parse_options: eCryptfs: unrecognized option [$] [ 1610.740574][T26390] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1610.782750][T26390] Error parsing options; rc = [-22] 08:00:13 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 08:00:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000fa00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="1287e6404d7ab30e674c9c01a52842348c41099415423b48afcb991b435bf64f93f374007ca1ff0f7e51e7669bb845149532d80d094dfb5e9c821a501fd7094d45000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000480)={r3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r3}, 0x8) r4 = dup(r0) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x8, 0x0, @dev={0xfe, 0x80, [], 0x24}, 0xfffffffc}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r6, 0x7f, "cb99b0", "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"}}, 0x110) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x420a0, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="00a3ee00005c00186e0f2e8b60f559c71c06685d9b714756857e2da5822130820d8b7f7190f3c4", @ANYRES16, @ANYBLOB="1f6d3e5bedf618"]) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(0xffffffffffffffff, 0xc0884113, &(0x7f00000002c0)={0x91, 0x4, 0x5, 0x2, 0x0, 0x1f, 0x0, 0xfffff80000000000, 0xffffffffffff8000, 0x9, 0x8, 0x5}) 08:00:13 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f0000000440)={0x0, @data}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = dup3(r0, r0, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000009140)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="45db000000000000000002000000714aee4ab988cccf75635abe4b0c4a161a19491d21898fa41aa8d1e2648baa43d2dcb670acb65c7646ab69f77ffa3938f59bc82b1e88ea6ba41e5e70a8fdd6b72a42d201aa42a7dd4db6e2db08582f58544facf66d992469b067db12638e6420b985ab6849591f86f948685431d4664095b0fbbc073a8b5966688eb13a0c6843d1a15f93244b0f6ba2d4f62861478aeffa62db71354771be39806bc408c9050fd66e36d2d46a2cf8432a2aa8d5c73f0b9925e11c2e1af11723862bc217884b4170f58e8bf71568f2e8bece5ac3d44567cdb8672253cc50c9702019f0"], 0x14}}, 0x0) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00e5f6", @ANYRES16=r5, @ANYBLOB="085abd3c1100fedbdf25020000000600060002000000080004000a0101000800020001000000"], 0x2c}}, 0x0) fcntl$setsig(r0, 0xa, 0x39) r6 = request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000400)='gtp\x00', 0xfffffffffffffffc) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='/dev/uinput\x00', r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r8, 0x80083313, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:13 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 08:00:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x1000, 0x1, 0x3, 0x0, 0x0, 0x5}, &(0x7f00000001c0)=0x20) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SVE_GET_VL(0x33, 0xe994) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830af41b0000000000", @ANYRES32=r2], 0x4}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x1c, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40004) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x149240, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830af41b0000000000", @ANYRES32=r5], 0x4}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r6, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x28}}, 0x40000) 08:00:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000ff00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:13 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x2b, @empty, 0x4e24, 0x1, 'sed\x00', 0x2, 0x2ab2, 0x53}, 0x2c) ioctl$TIOCCBRK(r0, 0x5428) 08:00:13 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r5 = fcntl$dupfd(r0, 0x406, r1) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r6, 0x4008ae89, &(0x7f0000000000)={0x2, 0x0, [0xc0000103, 0x0, 0x0, 0x0, 0x4b564d01]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$EBT_SO_GET_INFO(r8, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) 08:00:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000005ffabfff00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e22, 0x8, @ipv4={[], [], @empty}, 0x2}}, 0xfff, 0x3f, 0x3, 0x10000, 0x38, 0x1ff, 0x5}, 0x9c) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r10 = dup(r6) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r10, @ANYBLOB="2c63616368657461673d0f"]) 08:00:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$TIOCSBRK(r6, 0x5427) arch_prctl$ARCH_GET_CPUID(0x1011) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r7, 0x5428) 08:00:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000030e10000c9ffff00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:13 executing program 4: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x7fff}) 08:00:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x1e, 0x5, 0xfffffffc) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:13 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000080)={0x5, 0x2, 0xe00f, 0x800, 0x1, 0x8}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000000)=0x7fe) 08:00:13 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x80]}, 0x8) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x7, 0x0, 0x0, 0x0, 0xec1e89c}}) 08:00:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000ffffffff00000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "cc1591aa2035dada", "1aa8d5a944090685ce7e6261c63b49d6", "c3c0058f", "05e14e3727c27531"}, 0x28) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in6=@private2}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3503, 0x0, 0x0, 0x2}}, 0xe8) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x6, 0x4}, 0x20) 08:00:13 executing program 4 (fault-call:7 fault-nth:0): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000200000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000800)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000840), &(0x7f0000000880)=0x4) r3 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="7472616e733d66642c72666408003db968ce76fafa8780d27cd25d10", @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3dd762c7cf94c7bf52bbc5347117ef007f2c7980f56b686c", @ANYRESHEX=r3, @ANYBLOB="2c63616368657461673d0f"]) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x601, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x44402, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x20, &(0x7f00000000c0)=""/20, &(0x7f0000000180)=0x14) r5 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6, 0x181001) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000280), &(0x7f00000002c0)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) recvmsg$can_j1939(r7, &(0x7f0000000740)={&(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000380)=""/150, 0x96}, {&(0x7f0000000440)=""/36, 0x24}, {&(0x7f0000000480)=""/33, 0x21}, {&(0x7f00000004c0)=""/12, 0xc}, {&(0x7f0000000500)=""/108, 0x6c}, {&(0x7f0000000580)=""/184, 0xb8}], 0x6, &(0x7f00000006c0)=""/94, 0x5e}, 0x2100) 08:00:14 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:14 executing program 2: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000740)={0x0, 0xb0, &(0x7f0000000680)=[@in6={0xa, 0x4e21, 0x6, @loopback, 0x10001}, @in={0x2, 0x4e22, @rand_addr=0x64010101}, @in6={0xa, 0x4e24, 0x3, @mcast2}, @in6={0xa, 0x4e23, 0x420, @dev={0xfe, 0x80, [], 0x36}, 0x7}, @in6={0xa, 0x4e23, 0x7fff, @ipv4={[], [], @broadcast}, 0x5}, @in={0x2, 0x4e21, @rand_addr=0x64010102}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000640)=0x10) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40080, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000080)={0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) pidfd_getfd(r3, r5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$IP_VS_SO_GET_SERVICES(r7, 0x0, 0x482, &(0x7f0000000500)=""/207, &(0x7f0000000600)=0xcf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$GIO_FONTX(r9, 0x4b6b, &(0x7f00000004c0)={0x141, 0x6, &(0x7f00000000c0)}) 08:00:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) pread64(r0, &(0x7f0000000080)=""/63, 0x3f, 0x9) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000000)={0x5, 0x401, 0x7, 0x1f, 0x2, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind$rxrpc(r4, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @rand_addr=0x64010100}}, 0x24) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000300000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:14 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x2, "010000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000400000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1612.232438][T26472] 9pnet: Insufficient options for proto=fd 08:00:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x80, 0x0) move_mount(r2, &(0x7f0000000000)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x40) 08:00:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in6=@private2, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x7}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xe8) [ 1612.275951][T26474] 9pnet: Insufficient options for proto=fd 08:00:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat(r1, &(0x7f0000000180)='./file0\x00', 0x100, 0x180) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) dup2(r6, r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYRES64=r7, @ANYRESHEX=r2, @ANYRESHEX=r6, @ANYBLOB="c55679b76113a3941618aa5c763f0289a34eb7ea2f8ab258a09926f75f69d689b1a441fee97ea84b4c2356d3aa5e4e8a5ffe847a3c050aebe2fd1b16aafa6cea829361d57ea30f2dced765b576ab56c0b1b8dc69b883dd2e94f49cea3d1419978092969e3ccfa61b61b49099c7a351eab05c267b76a0093be55e8b6197835edb3e57ce556487cb6e64feacf2f44d3ea0fe1b2644006a42", @ANYBLOB="2c63616368657461673d0f"]) 08:00:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000500000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r5 = dup3(r0, r1, 0x80000) ioctl$KVM_GET_EMULATED_CPUID(r5, 0xc008ae09, &(0x7f0000000080)=""/149) 08:00:14 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0xa, "010000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x80400, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000140)={'lo\x00', {0x2, 0x4e22, @private=0xa010100}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="3b0b2c6361636865746167acf9"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$CAN_RAW_FILTER(r5, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f00000000c0)=0x28) 08:00:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x2, 0x70bd26, 0x25dfdbfb, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in6=@dev={0xfe, 0x80, [], 0xb}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000600000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1612.545275][T26501] 9pnet: Insufficient options for proto=fd [ 1612.563540][T26505] 9pnet: Insufficient options for proto=fd 08:00:14 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "020000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x106, 0x9, &(0x7f0000001700)=[{&(0x7f0000000180)="c4f03006c02448aeea3a0f64b1117de994f68e34919d4a", 0x17, 0x684}, {&(0x7f00000001c0)="bfaa70132a375562be", 0x9, 0x100000001}, {&(0x7f0000000280)="7af2e186fc9be51c2102bb4e4e7361f9ed2f1fa9e3f83e6dc6952cc17804da667059852efc515aa71e330103b50b93bb92c9bf6553fe2c322908c9167d5aad2a02b9bf7e4a55e350b0e1cadfef9eea109e75a5b4d7723f4acdb68b8a2b5884d349d7c4101443034e797ff1a0adc48fc3ae790716e5127f1dfc2b46a0b2e8a5d2ed8421210d1237056d78af4d1d5fc0526759ad1eca252c2cce2de8bd5bae10a8aeb5ca0c102786296b5eb5c20857f2d7f1de14329365", 0xb6, 0x8}, {&(0x7f0000000340)="c273b1cff415ca49c36afb4eadd0b4da9fb39a5b94256ceba48550fed27602d706a1bad17bf6a908389b7bc5328c10767c6013bdef3fd7f978bba77d11902f40f12107d7b2e1413256ed7324b9c17294f6829b41cb5c965707d39c31a381bbcf4de2b89e54a09b29e18f3498f87e22a6e0bb8f035563f2ca77a15d6caa54981939afd8df2cbbe2b4e8c23ddd2e86b39cb8841b4e12c09124b67d37786d77aa34c6414b9712792d4643a12671d7c36780be64de7be44e24fc23", 0xb9, 0x4c82}, {&(0x7f0000000400)="fcdad32ec7469f44a643c553dd4517c67ed40876f713983cdcec2b3e4defb4fa8e5e4e694fab29c34be214127640026678dffa15349d300bbcb6b847ec8c6a38c4e853df3a0634ee693eff0a65f225b0fb9a86473664bd379ac2818b773339a252eb356d96568a79bc8a44f69609fe1df98261ab1dba6882a39893ffb10c1cdd0a1ade1a9cd4010d904f11607c240540bbbf2f44f95e443306d8298b82c3bdffed9195d43dceb0c97d1f9980c07de879c39c4f8564f0", 0xb6, 0x3f}, {&(0x7f00000004c0)="20a0a0040834c470206bef01a2d9e320ec0a631044729660ef1e7ca5c16d6ffe0e2f98bc2c09d29e3a33bbc51e96bf2f7ab7bc5c2585b067bc9d983b6b5a25d43800124b7557ca6e14e2f5a4443535144c75622dd15af96fa80ebcc120010747d085fd1f5d5948c47906bcdbca285e8d2aa04235c0a99a78e04fd60e6d96498ada2a89f33d198316affc5c647dd6b03be340dacd665f58035f350af1e7af38dfa9d11ca7997f3bd135e6e7e0e14bc99b934f70b65a99c325b7627ae5f3073fb8b4e7069289324625c63765a1eaf188fefbf13cae44f31227f8c82d08d3d42df3f9568608f3aff5acf104bbb2c83e1c", 0xef, 0x3}, {&(0x7f00000005c0)="8ecc833f7ff69f217b4f636f6ca58720dfb62571baece417af2cdf5f77997cc3db4182b19b2ff2c3e1bbd3cd4b956632e5bb19b091109b4408b0ca6bc6f0c4ffa50442bcef8b13004e5e831b52e63db4b949603ac03e1c27ea", 0x59, 0xfffffffffffffe01}, {&(0x7f0000000640)="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", 0x1000, 0x100}, {&(0x7f0000001640)="d037ce61b5b554de6c5f2e3fc9361525a6c6a91013d92c51e30a34cd90a7812b0a6314fc8fd05edb5839d9a2f7aee1fb18df29dd73fadd13ecac4b05e218286640eb847ec3f6e796c3fe6e32ee134512371ffc36c846f0fde32059cf81253bf35f4e05257b7c77ab0694d50eda5d66c5595ab87dd3e6f146ce8a72195f2ee79c594e1d3b01431dfa6e286308c2ad441f9a2a0409c5ad9c8cd8b38e60695933d0ecc97e416b917cd26665472a02c1", 0xae, 0x8001}], 0x284498, &(0x7f0000001800)={[{@umask={'umask', 0x3d, 0x1ff}}], [{@smackfshat={'smackfshat', 0x3d, ':'}}, {@obj_role={'obj_role', 0x3d, '!'}}, {@audit='audit'}, {@obj_type={'obj_type', 0x3d, '9p\x00'}}]}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c63616368657461673d0f"]) 08:00:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4041, 0x0) ioctl$TIOCCBRK(r0, 0x5428) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140)='/dev/input/mice\x00', 0x2740) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x8, 0x3, 0x0, 0x0, {0x3, 0x0, 0x4}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_SYN_SENT2={0x8, 0x9, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_TCP_LAST_ACK={0x8, 0x6, 0x1, 0x0, 0xffff7fff}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x240408d4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='/dev/ptmx\x00', r2) 08:00:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) accept4$bt_l2cap(r2, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x800) 08:00:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:14 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "030000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) open(&(0x7f0000000000)='./file0\x00', 0x22640, 0x0) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000800000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x4e20, 0x0, 0x0, 0xa0}, {}, {0x0, 0x8000000000000000}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffff}}, 0xe8) 08:00:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="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"]) 08:00:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xd0800, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000900000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:15 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "050000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0x2}, {{@in=@loopback}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2}}, 0xe8) 08:00:15 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "060000000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000a00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:15 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "000600000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000b00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x707, 0x0, 0x6}, {0xff, 0x5, 0x3, 0x7}, {0x1000, 0x4, 0x80}, {0x8000, 0x1, 0x6, 0x91a9}]}, 0x10) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_GET_DUMPABLE(0x3) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@rand_addr=0x64010102, @in=@private=0xa010100}, {}, {0x2, 0x0, 0x2}, 0xffffffff, 0x6e6bb1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3, 0x0, 0x3}}, 0xe8) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766648d6f3d", @ANYRESHEX=r2, @ANYBLOB="2c63611208000061673d0f", @ANYRESOCT=r1, @ANYRESDEC=r0]) 08:00:15 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010200000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000d00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1613.442994][T26581] 9pnet: Insufficient options for proto=fd 08:00:15 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010400000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000e00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$packet(r1, &(0x7f0000000100)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @random="d904f96542d8"}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c63616368670000673d0f"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$CAPI_REGISTER(r6, 0x400c4301, &(0x7f0000000180)={0x80, 0xdd99, 0x6}) 08:00:15 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010600000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000f00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:15 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010c00000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) pipe(&(0x7f0000000640)) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0xf4, r4, 0x1, 0x0, 0x0, {0x2}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x27}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}]}, 0xf4}, 0x1, 0xa00000000000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x68, r4, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7b}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3e3c}]}, 0x68}, 0x1, 0x0, 0x0, 0x40c4}, 0x8c670ad58dc69903) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000000)=0x100) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "011200000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001100000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xf) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, 0xe8) 08:00:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "011800000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fsetxattr$smack_xattr_label(r6, &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)={'9p\x00'}, 0x4, 0x4) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_G_EXT_CTRLS(r8, 0xc0205647, &(0x7f0000000280)={0xa30000, 0x6, 0x1000, r5, 0x0, &(0x7f0000000200)={0x9a090e, 0x7fff, [], @value=0xd6fc69a}}) ioctl$VFIO_CHECK_EXTENSION(r9, 0x3b65, 0x4) unlinkat(r4, &(0x7f0000000100)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 08:00:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001200000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010006000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001800000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r9, 0xc04c5349, &(0x7f0000000380)={0x1, 0x4, 0x100}) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_TYPE(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x6c, 0xd, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_FAMILY={0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20008041}, 0x8004) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:16 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c776664ff003da5521d99a0bf7fa814f3bb35e879eb2b930a89ce8ae2ce2fbe520120b1b367614ad38c05000000c9d6c07a11af9e36099b9ffffe7be3a2b83581d7394d366702dec3d6372254c0db20a14ee1786bf1d1e2121c4ed72bfb727d301685ccb95088b60b57cf3f8f3d7413646cf392ad769bab9c6f282bd7b584f079e776e014a7f266205f20ce1476d867fead639517723e68", @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 08:00:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002400000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "01000c000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c63616368657461673d0f"]) 08:00:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) socket(0x400000000000010, 0x3, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be9a4d15eda8ac6e1847cdae618a70000ed190e00000816000010", 0x24) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'vlan0\x00'}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}, {}, {0x0, 0x4}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 08:00:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002500000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:16 executing program 5: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000180)={0xffffffff, 0x2, 0x9c5, 0x8}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) getsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 1614.472660][T26653] 9pnet: Insufficient options for proto=fd 08:00:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "01003f000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xe8) 08:00:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "01d001010000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000003000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000003c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "0126e5010000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = openat$cgroup_ro(r4, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r5, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000080)=0x4) r6 = socket(0x400000000000010, 0x3, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r7 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000000)={'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r10 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xb, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x7}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in6=@empty}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x3}}, 0xe8) 08:00:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000040000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004800000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000100040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000200040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000005200000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000400040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000006000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000006800000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000600040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000c00040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000006c00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000001200040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000007400000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000001800040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000007a00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010001e52600040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000a000000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000fa00000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000003f00040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004002000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "01000101d000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000003000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "01fffffdef00040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000002003000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "01effdffff00040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000003603000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r4, 0xdbf3, 0x6, 0x1}) r6 = io_uring_setup(0x196, &(0x7f0000000040)) r7 = io_uring_setup(0x196, &(0x7f0000000040)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0xa, 0x0, r8) io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0xa, 0x0, r8) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r11 = dup(r10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r9, @ANYBLOB=',wfdno=', @ANYRESHEX=r11, @ANYBLOB="2c63616368657461673d0f"]) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "017fffffff00040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000b403000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010002000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000005000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="e0010000", @ANYRES16=r7, @ANYBLOB="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"], 0x1e0}, 0x1, 0x0, 0x0, 0x8040}, 0x80) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d0f"]) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010004000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000006000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010006000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000007000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) write$P9_RSETATTR(r5, &(0x7f0000000180)={0x7, 0x1b, 0x2}, 0x7) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f0000000100)=0x6004) r6 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB="2c63616368657461673d0f"]) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "01000c000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000009000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010012000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000a000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x8, 0x5, 0x1ff, 0xa3, 0xfffffffffffffffc, 0x9, 0x0, 0x3, 0x3, 0x80, 0x401, 0x3, 0x1, 0x20, 0x7fff, 0x400], 0xd000, 0x1000}) r4 = dup(r1) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000080)={0x1f, 0x1, 0x5, 0x7fff, 0x81}, 0xc) r5 = dup(r0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d66642c7266646e803d", @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="569ef58f165b16b31ffdd3f70ae779a6991dfb7a160d3b32636f7f2f46b7c001c1f677f6b691efbdbacb0454d0e54f5e82f89bd5e5c2b206030771b6ed4c2b796ea178f42ee160de16c23f011ed737ed513597862db8134758d392ce9cd58d0d2720f936b56352a0d73b6e531e4bd092d81330bc1af487a0c890c19dc4d7732b87fbebcd61ef61eb4853686070d328579d400e040000000000"]) 08:00:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010018000000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000b000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1617.772477][T26831] 9pnet: Insufficient options for proto=fd [ 1617.790530][T26835] 9pnet: Insufficient options for proto=fd 08:00:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000c000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000080)={0xc238, 0x7}) dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESDEC=r3, @ANYRES16=r0, @ANYBLOB="2c63616368657461673d0f"]) 08:00:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000060000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000d000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1617.938214][T26842] 9pnet: Insufficient options for proto=fd 08:00:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000040)={0x2}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000001c0)=0x6, 0x4) r5 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="2c63616368657461673d0f"]) 08:00:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "0100000c0000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000e000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "0100003f0000040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000f000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 08:00:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000140)={0x8, @sliced={0x7f, [0xffd3, 0xfff8, 0xffff, 0x7, 0xaf42, 0xffc0, 0xff86, 0x806, 0x6aed, 0x3f, 0xff, 0xffff, 0x1, 0x0, 0xd39, 0xffff, 0x7, 0x8000, 0xfffb, 0x3, 0xffff, 0x1, 0xab, 0x336, 0x4f0, 0x9, 0x0, 0x3f, 0x401, 0x4, 0x1000, 0xfff, 0x5, 0x6, 0x8, 0x1d79, 0x0, 0xa661, 0x2, 0x7f, 0x400, 0xffff, 0x7000, 0x31f, 0x7, 0x3, 0x47ff, 0xfff], 0x7f}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x88000, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x240, 0x0) r9 = dup(r8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r9, @ANYBLOB="2c63616368657461673d0f"]) syncfs(r0) 08:00:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080), 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "0100d0010100040000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 08:00:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000011000000000000000000006112040000000000950000000000000068c78c1f5b36bac9f1b9fad9ec23cb5eaa24b2b970c0ad3a5331b560b2cc4baeecd8270e574f89f8383203bea3a26e12e96d"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) [ 1618.344139][ T2524] ------------[ cut here ]------------ [ 1618.356571][ T2524] WARNING: CPU: 1 PID: 2524 at fs/read_write.c:517 __kernel_write+0x8e5/0xa60 [ 1618.391359][ T2524] Kernel panic - not syncing: panic_on_warn set ... [ 1618.397991][ T2524] CPU: 1 PID: 2524 Comm: kworker/1:5 Not tainted 5.8.0-rc7-syzkaller #0 [ 1618.406312][ T2524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1618.416381][ T2524] Workqueue: events p9_write_work [ 1618.421405][ T2524] Call Trace: [ 1618.424695][ T2524] dump_stack+0x1f0/0x31e [ 1618.429039][ T2524] panic+0x264/0x7a0 [ 1618.432942][ T2524] ? __warn+0x102/0x250 [ 1618.437106][ T2524] ? __kernel_write+0x8e5/0xa60 [ 1618.441956][ T2524] ? __kernel_write+0x8e5/0xa60 [ 1618.446803][ T2524] __warn+0x227/0x250 [ 1618.450790][ T2524] ? __kernel_write+0x8e5/0xa60 [ 1618.455639][ T2524] report_bug+0x1b1/0x2e0 [ 1618.460328][ T2524] handle_bug+0x42/0x80 [ 1618.464496][ T2524] exc_invalid_op+0x16/0x40 [ 1618.469000][ T2524] asm_exc_invalid_op+0x12/0x20 [ 1618.473851][ T2524] RIP: 0010:__kernel_write+0x8e5/0xa60 08:00:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket(0x400000000000010, 0x3, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_PROP_LIST={0x2c, 0x34, 0x0, 0x1, [{0x14, 0x36, 'dummy0\x00'}, {0x14, 0x35, 'ip6gre0\x00'}]}]}, 0x4c}}, 0x0) r9 = syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0xbc, r9, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4c, 0x8, 0x0, 0x1, [{0x4}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x220c5d25}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15b1ec1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdbddab8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe847df9}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x40, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5986b8b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x8, 0xc, 0x0, 0x1, [{0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0x4}, {0x4}, {0x4}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x48840}, 0x4000000) sendmsg$NLBL_CIPSOV4_C_LIST(r5, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x2dc, r9, 0x300, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x120, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xca}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x274bf669}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1a1bf542}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a9e94db}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x343e4b68}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22b01760}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45692d78}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x79e996fa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1962ef63}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x238ffaff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6c455993}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x99}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11effe47}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x44}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x231326bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x71aa9de1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x26}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc333a4d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6871d671}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2cfafe5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x3c, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15742240}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x55a46508}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x785329b2}]}, {0x4}, {0x4}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xeb}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x154, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x37296ba0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x330ea5d8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x17}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x86}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x619a77e4}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x19}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x37}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11eb59d0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a514975}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb7928b2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x46cf063d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x35}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52eff67f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4657c3e5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8001}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x700868e8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2fdbda8a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4541e1d5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6e92f3c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2bcb1853}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2bc458a4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x71}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x59}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x49}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x8044}, 0x40851) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000000)) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x24, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) [ 1618.479566][ T2524] Code: c1 e8 03 42 80 3c 28 00 74 08 4c 89 e7 e8 f3 da f6 ff 49 89 1c 24 e9 f8 f8 ff ff e8 75 cb b7 ff e9 ee f8 ff ff e8 6b cb b7 ff <0f> 0b 49 c7 c6 f7 ff ff ff e9 81 fc ff ff 44 89 f9 80 e1 07 80 c1 [ 1618.499195][ T2524] RSP: 0018:ffffc90008377b20 EFLAGS: 00010293 [ 1618.505264][ T2524] RAX: ffffffff81bcc6d5 RBX: 00000000081a801d RCX: ffff8880a01f0140 [ 1618.513238][ T2524] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1618.521216][ T2524] RBP: 1ffff11012d6fb00 R08: ffffffff81bcbe57 R09: fffffbfff16f60c4 [ 1618.529206][ T2524] R10: fffffbfff16f60c4 R11: 0000000000000000 R12: 0000000000000015 [ 1618.537184][ T2524] R13: ffff888096b7d898 R14: ffff888096b7d780 R15: ffff888096b7d804 [ 1618.545175][ T2524] ? __kernel_write+0x67/0xa60 [ 1618.549941][ T2524] ? __kernel_write+0x8e5/0xa60 [ 1618.554813][ T2524] ? lock_is_held_type+0x87/0xe0 [ 1618.559771][ T2524] kernel_write+0x114/0x1e0 [ 1618.564285][ T2524] p9_write_work+0x588/0xcc0 [ 1618.568903][ T2524] process_one_work+0x789/0xfc0 [ 1618.573793][ T2524] worker_thread+0xaa4/0x1460 [ 1618.578514][ T2524] kthread+0x37e/0x3a0 [ 1618.582597][ T2524] ? rcu_lock_release+0x20/0x20 [ 1618.588406][ T2524] ? kthread_blkcg+0xd0/0xd0 [ 1618.593003][ T2524] ret_from_fork+0x1f/0x30 [ 1618.598881][ T2524] Kernel Offset: disabled [ 1618.603671][ T2524] Rebooting in 86400 seconds..