0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:07 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:07 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000745ffc), &(0x7f0000b96000)=0x8a) 06:36:07 executing program 2: 06:36:08 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000745ffc), &(0x7f0000b96000)=0x8a) 06:36:08 executing program 1: [ 258.200610][T20051] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:08 executing program 2: [ 258.249068][T20051] Error parsing options; rc = [-22] 06:36:08 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:08 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000745ffc), &(0x7f0000b96000)=0x8a) 06:36:08 executing program 2: 06:36:08 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:08 executing program 1: 06:36:08 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:08 executing program 2: 06:36:08 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x10, 0x0, &(0x7f0000b96000)) 06:36:08 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:08 executing program 1: 06:36:08 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x10, 0x0, &(0x7f0000b96000)) 06:36:08 executing program 2: [ 259.057625][T20190] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:09 executing program 1: 06:36:09 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:09 executing program 2: [ 259.247511][T20190] Error parsing options; rc = [-22] 06:36:09 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000a5d9900077ee04cd2bb0"], 0x82) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:09 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x10, 0x0, &(0x7f0000b96000)) 06:36:09 executing program 1: 06:36:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="150d3c8d73cdaaf389db72f1e5473e337af4a81c8a9e162af69be07cd0833b5aa5d3e28279aa681b4a91331c515e1f164e4e6b42313808ade5b33303867d21dfbf", 0x41) 06:36:09 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:09 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSBRKP(r1, 0x4020940d, 0x0) 06:36:09 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x10, &(0x7f0000745ffc), 0x0) [ 259.911601][T20326] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_flags}) 06:36:09 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 259.999805][ T7] Subscription rejected, illegal request [ 260.030819][T20326] Error parsing options; rc = [-22] 06:36:09 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:09 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:09 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x10, &(0x7f0000745ffc), 0x0) 06:36:10 executing program 2: syz_execute_func(&(0x7f0000000000)="982c240f050520d0f807914141e2e9fd855b66c4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22eb3ed3d3f0812535a0f69bc40000002e6744eeba0dfe8c73c4e3f57e050be3ceac07c4e201acac10000000808f29400443b00b0000000071b839f08171a38a806ebb5764f34c0f2dba5e9a0000c4618de3c0646464440f622a2d9600000064450f0fc7aedcdc1d440f2b550142c4b659b15dfba1c9fb110f0f3804830a00fa00") 06:36:10 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0xad01, 0x0, @empty, @empty, {[@lsrr={0x83, 0x3}]}}, @icmp=@time_exceeded={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @loopback}}}}}}, 0x0) [ 260.268343][T20456] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:10 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 260.335250][T20456] Error parsing options; rc = [-22] 06:36:10 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x10, &(0x7f0000745ffc), 0x0) 06:36:10 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 260.713623][T20588] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 260.747329][T20588] Error parsing options; rc = [-22] 06:36:10 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:10 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 261.013106][T20707] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:10 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:10 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 261.117800][T20707] Error parsing options; rc = [-22] 06:36:11 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\xff', 0x0, &(0x7f0000000340)='\x00') 06:36:11 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) 06:36:11 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:11 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:11 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) [ 261.895221][T20961] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 261.920314][T20961] Error parsing options; rc = [-22] 06:36:11 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) 06:36:11 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:11 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\xff', 0x0, &(0x7f0000000340)='\x00') 06:36:12 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:12 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000000000000000000000000000000400000000000000000000000000000000000000000003800"/65], 0x41) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:12 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:36:12 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) 06:36:12 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:12 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) 06:36:12 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x8c', 0x0, &(0x7f0000000340)='\x00') 06:36:12 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000000000000000000000000000000400000000000000000000000000000000000000000003800"/65], 0x41) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:12 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) 06:36:12 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) 06:36:12 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:12 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\xf6', 0x0, &(0x7f0000000340)='\x00') 06:36:12 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) [ 263.069155][ T8765] Subscription rejected, illegal request 06:36:13 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:13 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) 06:36:13 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:13 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) 06:36:13 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) 06:36:13 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 263.493954][T21468] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 263.539425][T21468] Error parsing options; rc = [-22] 06:36:13 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) 06:36:13 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:36:13 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:13 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) 06:36:13 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) 06:36:13 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 263.979969][T21599] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:13 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:13 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) 06:36:13 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 264.039383][T21599] Error parsing options; rc = [-22] 06:36:13 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:36:13 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) 06:36:14 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:14 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) 06:36:14 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) 06:36:14 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) 06:36:14 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 264.341629][T21721] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 264.401850][T21721] Error parsing options; rc = [-22] 06:36:14 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 06:36:14 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) 06:36:14 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:14 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) 06:36:14 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:14 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:14 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 06:36:14 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) [ 265.028565][T21852] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 265.050310][T21852] Error parsing options; rc = [-22] 06:36:15 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) 06:36:15 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) 06:36:15 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) 06:36:15 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:15 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:15 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) [ 265.454807][T21987] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 265.512766][T21987] Error parsing options; rc = [-22] 06:36:15 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300000000000000000000000000000040"], 0x21) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:15 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) 06:36:15 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:15 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) 06:36:15 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:15 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) [ 265.954994][T22108] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 266.000100][T22108] Error parsing options; rc = [-22] 06:36:15 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) 06:36:15 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) [ 266.025151][ T7] Subscription rejected, illegal request 06:36:15 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 06:36:15 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:15 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f"], 0x1) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:16 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) 06:36:16 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:16 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) 06:36:16 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) [ 266.380562][T22235] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 266.405461][T22235] Error parsing options; rc = [-22] 06:36:16 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") write(0xffffffffffffffff, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:16 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) 06:36:16 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 06:36:16 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') 06:36:16 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") write(0xffffffffffffffff, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:16 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:16 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) [ 266.845086][T22368] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 266.912200][T22368] Error parsing options; rc = [-22] 06:36:16 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) 06:36:16 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f"], 0x1) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:16 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 06:36:16 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) 06:36:16 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") write(0xffffffffffffffff, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:16 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:17 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) 06:36:17 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) 06:36:17 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 267.240887][T22493] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 267.277642][T22493] Error parsing options; rc = [-22] 06:36:17 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:17 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:17 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) 06:36:17 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 267.506257][T22615] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 267.556767][T22615] Error parsing options; rc = [-22] 06:36:17 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f"], 0x1) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:17 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:17 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) 06:36:17 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) 06:36:17 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:17 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:17 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') [ 268.099494][T22738] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:17 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:18 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:18 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) [ 268.259065][T22738] Error parsing options; rc = [-22] 06:36:18 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:18 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 268.516241][T22866] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 268.542893][T22866] Error parsing options; rc = [-22] 06:36:18 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003"], 0x11) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:18 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:18 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) 06:36:18 executing program 3: r0 = getpid() getpriority(0x0, r0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:18 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:18 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 268.923223][T22979] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:18 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 268.975000][T22979] Error parsing options; rc = [-22] 06:36:18 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:18 executing program 3: r0 = getpid() getpriority(0x0, r0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:18 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') 06:36:18 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:19 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 269.326472][T23107] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 269.350207][T23107] Error parsing options; rc = [-22] 06:36:19 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003"], 0x11) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:19 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:19 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 06:36:19 executing program 3: r0 = getpid() getpriority(0x0, r0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:19 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:19 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 269.785468][T23222] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:19 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:19 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 269.835884][T23222] Error parsing options; rc = [-22] 06:36:19 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:19 executing program 3: getpid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:19 executing program 1: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:19 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003"], 0x11) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:20 executing program 3: getpid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:20 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:20 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 1: r0 = getpid() getpriority(0x0, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 1: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 3: getpid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:20 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:20 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 270.955799][T23485] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 271.002918][T23485] Error parsing options; rc = [-22] 06:36:21 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030000000000000000"], 0x19) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:21 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:21 executing program 3: getpriority(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:21 executing program 2: r0 = getpid() getpriority(0x0, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:21 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 271.566807][T23609] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:21 executing program 2: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 271.613842][T23609] Error parsing options; rc = [-22] 06:36:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:21 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:21 executing program 3: getpriority(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:21 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 271.892704][T23732] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 271.956865][T23732] Error parsing options; rc = [-22] 06:36:22 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030000000000000000"], 0x19) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:22 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:22 executing program 3: getpriority(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:22 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 272.410650][T23841] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:22 executing program 3: getpid() getpriority(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:22 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 272.478045][T23841] Error parsing options; rc = [-22] 06:36:22 executing program 0: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x2, &(0x7f0000000340)='\x00') 06:36:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 3: getpid() getpriority(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:23 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030000000000000000"], 0x19) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:23 executing program 0: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 273.261711][T23982] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 0: r0 = getpid() getpriority(0x0, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 273.339426][T23982] Error parsing options; rc = [-22] 06:36:23 executing program 3: getpid() getpriority(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) 06:36:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/29], 0x1d) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:23 executing program 0: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x3, &(0x7f0000000340)='\x00') 06:36:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:23 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 274.206050][T24129] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 274.279061][T24129] Error parsing options; rc = [-22] [ 274.291876][ T8195] Subscription rejected, illegal request 06:36:24 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:24 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030000000000000000"], 0x19) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:24 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4, &(0x7f0000000340)='\x00') 06:36:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 274.629999][T24264] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:24 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 274.719548][T24264] Error parsing options; rc = [-22] 06:36:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:24 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x5, &(0x7f0000000340)='\x00') 06:36:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 274.944945][T24387] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 274.986774][T24387] Error parsing options; rc = [-22] 06:36:25 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030000000000000000"], 0x19) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:25 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6, &(0x7f0000000340)='\x00') 06:36:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 275.350746][T24510] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 275.381343][T24510] Error parsing options; rc = [-22] 06:36:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:25 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7, &(0x7f0000000340)='\x00') 06:36:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 275.654521][T24632] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 275.707771][T24632] Error parsing options; rc = [-22] 06:36:25 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030000000000000000"], 0x19) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:25 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:25 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x48, &(0x7f0000000340)='\x00') [ 276.218323][T24751] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 276.265211][T24751] Error parsing options; rc = [-22] 06:36:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/27], 0x1b) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4c, &(0x7f0000000340)='\x00') 06:36:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 277.123253][T24897] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 277.236120][T24897] Error parsing options; rc = [-22] 06:36:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/27], 0x1b) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:27 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x60, &(0x7f0000000340)='\x00') 06:36:27 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:27 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:28 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x68, &(0x7f0000000340)='\x00') 06:36:28 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/27], 0x1b) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:28 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:28 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6c, &(0x7f0000000340)='\x00') 06:36:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:28 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x74, &(0x7f0000000340)='\x00') 06:36:28 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:29 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:29 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7a, &(0x7f0000000340)='\x00') 06:36:29 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 279.855760][ T7] Subscription rejected, illegal request 06:36:29 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:29 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x300, &(0x7f0000000340)='\x00') 06:36:29 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/27], 0x1b) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 280.079556][T25750] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 280.119730][T25750] Error parsing options; rc = [-22] 06:36:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:30 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x500, &(0x7f0000000340)='\x00') 06:36:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 280.436113][T25880] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 280.472680][T25880] Error parsing options; rc = [-22] 06:36:30 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/27], 0x1b) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x600, &(0x7f0000000340)='\x00') 06:36:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 280.922268][T26004] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 280.947574][T26004] Error parsing options; rc = [-22] 06:36:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:30 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x700, &(0x7f0000000340)='\x00') [ 281.240646][T26129] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 281.262946][T26129] Error parsing options; rc = [-22] 06:36:31 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/27], 0x1b) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:31 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:31 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x1020, &(0x7f0000000340)='\x00') 06:36:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:31 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x2000, &(0x7f0000000340)='\x00') 06:36:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 06:36:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:32 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x0, 0x1}, 0x2c) 06:36:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x0, 0x1}, 0x2c) 06:36:32 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x2010, &(0x7f0000000340)='\x00') 06:36:32 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x0, 0x1}, 0x2c) 06:36:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x0, 0x1}, 0x2c) [ 282.717600][ T8977] Subscription rejected, illegal request 06:36:32 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:32 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b0") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x0, 0x1}, 0x2c) 06:36:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:32 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4000, &(0x7f0000000340)='\x00') 06:36:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x0, 0x1}, 0x2c) [ 282.932660][ T7] Subscription rejected, illegal request 06:36:32 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) [ 283.004260][T26715] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 283.039448][T26715] Error parsing options; rc = [-22] 06:36:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3}, 0x2c) 06:36:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3}, 0x2c) [ 283.174648][ T7] Subscription rejected, illegal request 06:36:33 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b0") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:33 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4800, &(0x7f0000000340)='\x00') 06:36:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3}, 0x2c) 06:36:33 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) 06:36:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3}, 0x2c) [ 283.388048][T26940] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3}, 0x2c) 06:36:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3}, 0x2c) [ 283.461498][T26940] Error parsing options; rc = [-22] 06:36:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e21, 0x3, 0x1}, 0x2c) [ 283.489916][ T7] Subscription rejected, illegal request 06:36:33 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) 06:36:33 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b0") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:33 executing program 2: 06:36:33 executing program 1: 06:36:33 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4c00, &(0x7f0000000340)='\x00') 06:36:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:33 executing program 2: 06:36:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:33 executing program 1: [ 283.767710][ T8195] Subscription rejected, illegal request 06:36:33 executing program 5: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) [ 283.889784][T27209] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:33 executing program 1: 06:36:33 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x0, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 283.965324][T27209] Error parsing options; rc = [-22] 06:36:33 executing program 2: 06:36:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x0, 0x1}, 0x2c) 06:36:33 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6000, &(0x7f0000000340)='\x00') 06:36:34 executing program 2: r0 = getpid() getpriority(0x0, r0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) [ 284.155157][ T749] Subscription rejected, illegal request 06:36:34 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) 06:36:34 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x0, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x0, 0x1}, 0x2c) 06:36:34 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) 06:36:34 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6800, &(0x7f0000000340)='\x00') 06:36:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x0, 0x1}, 0x2c) 06:36:34 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r4, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) 06:36:34 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:34 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x0, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:34 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3}, 0x2c) 06:36:34 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:34 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:34 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6c00, &(0x7f0000000340)='\x00') 06:36:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3}, 0x2c) 06:36:34 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x0, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3}, 0x2c) 06:36:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semget$private(0x0, 0x2, 0x8) semget$private(0x0, 0x1, 0x40) semget$private(0x0, 0x4, 0x4) semget$private(0x0, 0x6, 0x1) r1 = semget(0x0, 0x4, 0x201) semctl$IPC_RMID(r1, 0x0, 0x10) 06:36:35 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:35 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7400, &(0x7f0000000340)='\x00') 06:36:35 executing program 2 (fault-call:2 fault-nth:0): r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:35 executing program 0 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:35 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x0, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semget$private(0x0, 0x2, 0x8) semget$private(0x0, 0x1, 0x40) semget$private(0x0, 0x4, 0x4) semget$private(0x0, 0x6, 0x1) r1 = semget(0x0, 0x4, 0x201) semctl$IPC_RMID(r1, 0x0, 0x10) 06:36:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 285.600894][ T749] Subscription rejected, illegal request 06:36:35 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7a00, &(0x7f0000000340)='\x00') 06:36:35 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:35 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semget$private(0x0, 0x2, 0x8) semget$private(0x0, 0x1, 0x40) semget$private(0x0, 0x4, 0x4) semget$private(0x0, 0x6, 0x1) r1 = semget(0x0, 0x4, 0x201) semctl$IPC_RMID(r1, 0x0, 0x10) 06:36:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 285.898110][ T8765] Subscription rejected, illegal request 06:36:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semget$private(0x0, 0x2, 0x8) semget$private(0x0, 0x1, 0x40) semget$private(0x0, 0x4, 0x4) semget$private(0x0, 0x6, 0x1) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:35 executing program 5 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:35 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0xedc0, &(0x7f0000000340)='\x00') 06:36:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 286.276866][T28482] FAULT_INJECTION: forcing a failure. [ 286.276866][T28482] name failslab, interval 1, probability 0, space 0, times 0 [ 286.386896][T28482] CPU: 0 PID: 28482 Comm: syz-executor.5 Not tainted 5.1.0-rc7-next-20190501 #34 [ 286.396081][T28482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.406143][T28482] Call Trace: [ 286.409467][T28482] dump_stack+0x172/0x1f0 [ 286.413820][T28482] should_fail.cold+0xa/0x15 [ 286.418431][T28482] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 286.424260][T28482] ? ___might_sleep+0x163/0x280 [ 286.429129][T28482] __should_failslab+0x121/0x190 [ 286.434080][T28482] should_failslab+0x9/0x14 [ 286.438585][T28482] kmem_cache_alloc_trace+0x2d1/0x760 [ 286.443972][T28482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.450218][T28482] ? ns_capable_common+0x93/0x100 [ 286.455279][T28482] trie_alloc+0x203/0x460 [ 286.459628][T28482] ? security_bpf+0x91/0xc0 [ 286.464138][T28482] ? trie_lookup_elem+0x3e0/0x3e0 [ 286.469168][T28482] __do_sys_bpf+0xbdc/0x4560 [ 286.473767][T28482] ? bpf_prog_load+0x1500/0x1500 [ 286.478712][T28482] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 286.484176][T28482] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 286.489658][T28482] ? lockdep_hardirqs_on+0x418/0x5d0 [ 286.494954][T28482] ? retint_kernel+0x2b/0x2b [ 286.499551][T28482] ? trace_hardirqs_on_caller+0x6a/0x220 [ 286.505197][T28482] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 286.510685][T28482] __x64_sys_bpf+0x73/0xb0 [ 286.515107][T28482] do_syscall_64+0x103/0x670 [ 286.519708][T28482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.525600][T28482] RIP: 0033:0x458da9 [ 286.529527][T28482] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.549137][T28482] RSP: 002b:00007f04791d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.557553][T28482] RAX: ffffffffffffffda RBX: 00007f04791d9c90 RCX: 0000000000458da9 [ 286.565532][T28482] RDX: 000000000000002c RSI: 0000000020000000 RDI: 0000000000000000 [ 286.573508][T28482] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 286.581479][T28482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f04791da6d4 [ 286.589455][T28482] R13: 00000000004bf05a R14: 00000000004cffa8 R15: 0000000000000004 06:36:36 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x0, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:36 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semget$private(0x0, 0x2, 0x8) semget$private(0x0, 0x1, 0x40) semget$private(0x0, 0x4, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:36 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x1000000, &(0x7f0000000340)='\x00') 06:36:36 executing program 5 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x5, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semget$private(0x0, 0x2, 0x8) semget$private(0x0, 0x1, 0x40) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 286.782147][T28571] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 286.811150][ T8765] Subscription rejected, illegal request 06:36:36 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x35, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 286.879315][ T8765] Subscription rejected, illegal request [ 286.907635][T28571] Error parsing options; rc = [-22] 06:36:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x6, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 287.080393][ T8765] Subscription rejected, illegal request [ 287.134557][ T8977] Subscription rejected, illegal request 06:36:37 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semget$private(0x0, 0x2, 0x8) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x7, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:37 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x3500, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:37 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x2000000, &(0x7f0000000340)='\x00') 06:36:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x8, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 287.462797][T28812] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 287.488817][T28812] Error parsing options; rc = [-22] [ 287.503374][ T7] Subscription rejected, illegal request 06:36:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semget(0x1, 0x3, 0x9) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 287.580834][ T749] Subscription rejected, illegal request 06:36:37 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x4000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:37 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x5, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x9, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) sendto$inet6(r0, &(0x7f0000000040)="707ad06122bcc9a5e9957329ec74d96f52f3d327de0ddf9b6c855e161b33a931200d81a514910970f876227253fd673fdcef283992580577028a20c05e9f760ccd4ee1cdf04bad4e8a125a5d4c84119601589e67017d9d94c377c97675dd4c99c588f93ede9ef7e6fef8b1c1f5e30c64158d3ebd0117571d187cda70bd495d3243700b4379f6e71b43cf9985b0bb4e415b023b4d79dfd6b87480897d748135ceb9b064cdaec31db8", 0xa8, 0x4, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:37 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x3000000, &(0x7f0000000340)='\x00') 06:36:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x6, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 287.849234][ T8977] Subscription rejected, illegal request 06:36:37 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 287.907549][ T749] Subscription rejected, illegal request [ 287.930483][T28948] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:37 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x1000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 287.975704][T28948] Error parsing options; rc = [-22] 06:36:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x7, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:38 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:38 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4000000, &(0x7f0000000340)='\x00') [ 288.177456][ T8765] Subscription rejected, illegal request 06:36:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x8, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 288.239647][ T7] Subscription rejected, illegal request 06:36:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:38 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x2000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 288.375900][T29085] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:38 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 288.421753][T29085] Error parsing options; rc = [-22] [ 288.449960][ T8977] Subscription rejected, illegal request 06:36:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semget$private(0x0, 0x2, 0x160) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x9, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 288.506951][ T8977] Subscription rejected, illegal request 06:36:38 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x35000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:38 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x5000000, &(0x7f0000000340)='\x00') 06:36:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:38 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 288.729009][ T8765] Subscription rejected, illegal request [ 288.749871][T29222] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 288.773086][T29222] Error parsing options; rc = [-22] 06:36:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 288.783434][ T8765] Subscription rejected, illegal request 06:36:38 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x40000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semget$private(0x0, 0x0, 0x400) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:38 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6000000, &(0x7f0000000340)='\x00') 06:36:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 289.037090][ T8765] Subscription rejected, illegal request 06:36:38 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140), 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 289.100239][ T8977] Subscription rejected, illegal request [ 289.135584][T29452] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x80) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:39 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x100000000000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 289.228450][T29452] Error parsing options; rc = [-22] 06:36:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x10, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 289.322615][ T8977] Subscription rejected, illegal request 06:36:39 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140), 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 289.389043][ T8977] Subscription rejected, illegal request 06:36:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x11, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:39 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x200000000000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:39 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7000000, &(0x7f0000000340)='\x00') 06:36:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x12, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x10) [ 289.646498][ T8765] Subscription rejected, illegal request [ 289.659575][T29594] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:39 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140), 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 289.702665][ T8765] Subscription rejected, illegal request 06:36:39 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x3500000000000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x13, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 289.869013][T29594] Error parsing options; rc = [-22] 06:36:39 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04", 0x12) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x10, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 289.901643][ T8977] Subscription rejected, illegal request [ 289.960418][ T8765] Subscription rejected, illegal request 06:36:39 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x4000000000000000, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:39 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x20000000, &(0x7f0000000340)='\x00') 06:36:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x14, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x11, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x10) [ 290.187253][T29743] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 290.211329][ T8977] Subscription rejected, illegal request 06:36:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x12, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x15, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 290.254259][T29743] Error parsing options; rc = [-22] [ 290.267743][ T749] Subscription rejected, illegal request 06:36:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:40 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04", 0x12) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:40 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x16, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x13, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:40 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x20100000, &(0x7f0000000340)='\x00') 06:36:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x18, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 290.601159][ T8195] Subscription rejected, illegal request 06:36:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x14, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:40 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 290.653772][ T8195] Subscription rejected, illegal request 06:36:40 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04", 0x12) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x180, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:40 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x40000000, &(0x7f0000000340)='\x00') 06:36:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x15, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 290.904895][ T8195] Subscription rejected, illegal request 06:36:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x300, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:40 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a900", 0x1b) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:40 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 291.016925][T30205] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 291.020056][ T8195] Subscription rejected, illegal request [ 291.050997][T30205] Error parsing options; rc = [-22] 06:36:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x16, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x500, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:41 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x48000000, &(0x7f0000000340)='\x00') 06:36:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 291.290299][ T749] Subscription rejected, illegal request 06:36:41 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a900", 0x1b) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x18, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 291.341293][T30328] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 291.368937][ T8977] Subscription rejected, illegal request 06:36:41 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x180, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 291.491040][T30328] Error parsing options; rc = [-22] 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x300, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x700, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 291.631681][ T7] Subscription rejected, illegal request 06:36:41 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a900", 0x1b) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 291.707316][ T749] Subscription rejected, illegal request 06:36:41 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4c000000, &(0x7f0000000340)='\x00') 06:36:41 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x500, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:41 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c08000900", 0x20) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 291.906864][T30579] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 292.009531][T30579] Error parsing options; rc = [-22] 06:36:41 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 292.060003][ T749] Subscription rejected, illegal request 06:36:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x700, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa00, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:42 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x60000000, &(0x7f0000000340)='\x00') 06:36:42 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a900", 0x1b) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:42 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c08000900", 0x20) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 292.293319][T30711] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 292.321699][ T749] Subscription rejected, illegal request [ 292.369108][T30711] Error parsing options; rc = [-22] [ 292.416851][ T8195] Subscription rejected, illegal request 06:36:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:42 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a900", 0x1b) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:42 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa00, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:42 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c08000900", 0x20) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:42 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x68000000, &(0x7f0000000340)='\x00') 06:36:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 292.727691][ T8977] Subscription rejected, illegal request [ 292.764997][T30848] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 292.804302][ T8765] Subscription rejected, illegal request 06:36:42 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 292.857099][T30848] Error parsing options; rc = [-22] 06:36:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe00, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:42 executing program 1: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:42 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b00", 0x22) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:42 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6c000000, &(0x7f0000000340)='\x00') 06:36:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf00, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 293.044779][ T8765] Subscription rejected, illegal request [ 293.132456][ T8765] Subscription rejected, illegal request 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:43 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:43 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 293.210166][T31079] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 293.239198][T31079] Error parsing options; rc = [-22] 06:36:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1100, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:43 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b00", 0x22) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe00, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 293.413703][ T749] Subscription rejected, illegal request 06:36:43 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x74000000, &(0x7f0000000340)='\x00') [ 293.469227][ T8195] Subscription rejected, illegal request 06:36:43 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1200, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf00, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:43 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b00", 0x22) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 293.607310][T31211] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 293.649105][T31211] Error parsing options; rc = [-22] 06:36:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1300, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x10) [ 293.720205][ T8195] Subscription rejected, illegal request [ 293.778088][ T7] Subscription rejected, illegal request 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1100, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:43 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1400, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:43 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b0000", 0x23) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:43 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7a000000, &(0x7f0000000340)='\x00') 06:36:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x300, 0x10) 06:36:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1200, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1500, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 294.034464][ T8765] Subscription rejected, illegal request [ 294.088401][ T749] Subscription rejected, illegal request 06:36:44 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:44 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b0000", 0x23) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 294.153766][T31359] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 294.190151][T31359] Error parsing options; rc = [-22] 06:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1600, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1300, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00, 0x10) 06:36:44 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x8cffffff, &(0x7f0000000340)='\x00') 06:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1800, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:44 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b0000", 0x23) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 294.388716][ T7] Subscription rejected, illegal request 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1400, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:44 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x20000035}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 294.462761][ T7] Subscription rejected, illegal request 06:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1500, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x4000, 0x10) 06:36:44 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:44 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0xc0ed0000, &(0x7f0000000340)='\x00') [ 294.720871][ T8765] Subscription rejected, illegal request 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1600, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:44 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x7ffff000}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1800, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x3000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 294.913716][T31621] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:44 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f, 0x10) [ 294.965727][ T8195] Subscription rejected, illegal request [ 294.999133][T31621] Error parsing options; rc = [-22] 06:36:44 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x2, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 295.026199][ T749] Subscription rejected, illegal request 06:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:45 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0xf6ffffff, &(0x7f0000000340)='\x00') [ 295.233505][ T8195] Subscription rejected, illegal request 06:36:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3000000, 0x10) 06:36:45 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x7, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x5000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:45 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:45 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0xffffff8c, &(0x7f0000000340)='\x00') [ 295.450231][ T8195] Subscription rejected, illegal request 06:36:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x6000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 295.524900][ T7] Subscription rejected, illegal request 06:36:45 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x8, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f000000, 0x10) 06:36:45 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x7000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:45 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0xfffffff6, &(0x7f0000000340)='\x00') [ 295.738326][ T7] Subscription rejected, illegal request 06:36:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x3000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:45 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x300, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x40000000, 0x10) 06:36:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x8000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:45 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:45 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0xedc000000000, &(0x7f0000000340)='\x00') [ 296.044819][ T8195] Subscription rejected, illegal request 06:36:45 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0xffffff1f, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x9000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x5000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f0000, 0x10) [ 296.235122][ T7] Subscription rejected, illegal request 06:36:46 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 296.280557][ T8195] Subscription rejected, illegal request 06:36:46 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x100000000000000, &(0x7f0000000340)='\x00') 06:36:46 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xf}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x6000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x300000000000000, 0x10) 06:36:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 296.521511][ T7] Subscription rejected, illegal request 06:36:46 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x7000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 296.619048][ T7] Subscription rejected, illegal request 06:36:46 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0x18}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x8000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:46 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x200000000000000, &(0x7f0000000340)='\x00') 06:36:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x3f00000000000000, 0x10) [ 296.860105][ T8765] Subscription rejected, illegal request 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x9000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:46 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 296.914360][ T8195] Subscription rejected, illegal request 06:36:46 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x2}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:46 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x300000000000000, &(0x7f0000000340)='\x00') 06:36:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 297.119175][ T8195] Subscription rejected, illegal request 06:36:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x4000000000000000, 0x10) 06:36:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:47 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x35}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:47 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:47 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x400000000000000, &(0x7f0000000340)='\x00') 06:36:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xff7f000000000000, 0x10) 06:36:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x10000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 297.472195][ T8765] Subscription rejected, illegal request 06:36:47 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x3500}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x11000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0xffffffff00000000, 0x10) 06:36:47 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x500000000000000, &(0x7f0000000340)='\x00') 06:36:47 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x12000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 297.778433][ T8977] Subscription rejected, illegal request 06:36:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:47 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x4000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 297.859268][ T8977] Subscription rejected, illegal request 06:36:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x2) 06:36:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x13000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:47 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x10000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 298.050618][ T8765] Subscription rejected, illegal request 06:36:47 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x600000000000000, &(0x7f0000000340)='\x00') [ 298.109071][ T8765] Subscription rejected, illegal request 06:36:48 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x1000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x14000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x11000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x3) [ 298.303767][ T8765] Subscription rejected, illegal request 06:36:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x15000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x12000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:48 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x700000000000000, &(0x7f0000000340)='\x00') [ 298.376521][ T8195] Subscription rejected, illegal request 06:36:48 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x2000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x16000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:48 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xb) 06:36:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x13000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x18000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 298.642689][ T8195] Subscription rejected, illegal request 06:36:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x14000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 298.736934][ T8195] Subscription rejected, illegal request 06:36:48 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x2000000000000000, &(0x7f0000000340)='\x00') 06:36:48 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x35000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:48 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xf) 06:36:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x15000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x80010000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 298.936733][ T8195] Subscription rejected, illegal request 06:36:48 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x40000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 298.993682][ T8765] Subscription rejected, illegal request 06:36:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x16000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:48 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x2010000000000000, &(0x7f0000000340)='\x00') 06:36:48 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x11) 06:36:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x18000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 299.256982][ T7] Subscription rejected, illegal request 06:36:49 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 299.319417][ T8765] Subscription rejected, illegal request 06:36:49 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4000000000000000, &(0x7f0000000340)='\x00') 06:36:49 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x100000000000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x40000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x12) 06:36:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 299.549189][ T8977] Subscription rejected, illegal request 06:36:49 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x80010000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 299.602222][ T7] Subscription rejected, illegal request 06:36:49 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x200000000000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:49 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4800000000000000, &(0x7f0000000340)='\x00') 06:36:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x13) 06:36:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 299.824797][ T8765] Subscription rejected, illegal request 06:36:49 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x3500000000000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:49 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x14) 06:36:49 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x4c00000000000000, &(0x7f0000000340)='\x00') 06:36:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 300.110924][ T7] Subscription rejected, illegal request 06:36:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:50 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x4000000000000000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:50 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:50 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)={0x3, 0x3, 0x7fff, 0x6}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000300)={'team0\x00'}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000140)=""/7) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 300.402718][ T8977] Subscription rejected, illegal request 06:36:50 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6000000000000000, &(0x7f0000000340)='\x00') 06:36:50 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 300.471324][ T749] Subscription rejected, illegal request 06:36:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) syncfs(r0) 06:36:50 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x800000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:50 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6800000000000000, &(0x7f0000000340)='\x00') 06:36:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 300.706549][ T749] Subscription rejected, illegal request 06:36:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x4, 0x81) r2 = dup(r0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000100)={r3, 0x3}) semctl$IPC_RMID(r1, 0x0, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x100, @mcast1, 0x6}, @in={0x2, 0x4e24, @local}], 0x2c) 06:36:50 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 300.803170][ T749] Subscription rejected, illegal request 06:36:50 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) 06:36:50 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x6c00000000000000, &(0x7f0000000340)='\x00') [ 301.033610][ T8977] Subscription rejected, illegal request 06:36:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 301.115889][ T7] Subscription rejected, illegal request 06:36:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:51 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x800000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:51 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x8002, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = dup3(r1, r1, 0x80000) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000000)={0x100000000, 0x1}) getpeername$netlink(r2, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f00000000c0)=0x20400001d) [ 301.371235][ T749] Subscription rejected, illegal request [ 301.439511][ T7] Subscription rejected, illegal request 06:36:51 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:51 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7400000000000000, &(0x7f0000000340)='\x00') 06:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:51 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xa00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:51 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x3, 0x1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='dummy0\x00'}) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 301.691221][ T8977] Subscription rejected, illegal request 06:36:51 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x7a00000000000000, &(0x7f0000000340)='\x00') 06:36:51 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:51 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:51 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x1, 0x22000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10400080}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xec, r1, 0x14, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x9}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x1}, 0x48080) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1ff, 0x202c00) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x38, r4, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x80}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x840}, 0x4000000) semctl$IPC_RMID(0x0, 0x0, 0x10) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x1, 0x800, 0xea13, 0x5, 0x0, 0x8, 0xc0000, 0x4, 0x4, 0x0, 0x6, 0x0, 0x7, 0x7f, 0x1, 0x8, 0x3, 0x37, 0x6, 0x20000000, 0x3, 0x7f, 0xfaad, 0x100, 0x8, 0x10001, 0x0, 0x8, 0x101, 0x9, 0x1, 0x8, 0xff, 0x7, 0xffffffffffffffb4, 0x3, 0x0, 0x5, 0x2, @perf_config_ext={0x7fff, 0x32}, 0x10110, 0x6, 0x9e, 0x9, 0x1000, 0x9, 0x1ff}, r5, 0x5, r2, 0xa) 06:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 302.022405][ T8977] Subscription rejected, illegal request 06:36:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:51 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x8cffffff00000000, &(0x7f0000000340)='\x00') [ 302.087500][ T7] Subscription rejected, illegal request 06:36:52 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1000000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffaea, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:52 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 302.351740][ T8977] Subscription rejected, illegal request 06:36:52 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 302.410046][ T8977] Subscription rejected, illegal request 06:36:52 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0xf6ffffff00000000, &(0x7f0000000340)='\x00') 06:36:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:52 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 302.603394][ T8977] Subscription rejected, illegal request 06:36:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = semget$private(0x0, 0x7, 0x10) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) semget(0x1, 0x0, 0x1) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x1, 0x4) semctl$IPC_RMID(r2, 0x0, 0x10) 06:36:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:52 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 302.698993][ T8195] Subscription rejected, illegal request 06:36:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:52 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:52 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x02') 06:36:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1300000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 302.900294][ T7] Subscription rejected, illegal request 06:36:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1000000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20\x00', 0x48000, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000500)=0x8024, 0x4) semget(0x1, 0x2, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000040)="11fbf4e9317b43c1707f6c359974e81412d3da9ef7061ecec4704db5189560b69090fd7258b7b2a46ef6fc523c1e3d535c01") [ 302.959399][ T749] Subscription rejected, illegal request 06:36:52 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 303.037134][ T2803] ecryptfs_parse_options: eCryptfs: unrecognized option [] [ 303.072655][ T2803] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 303.121569][ T2803] Error parsing options; rc = [-22] 06:36:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:53 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 303.226732][ T8195] Subscription rejected, illegal request 06:36:53 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x03') 06:36:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1500000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 303.309130][ T7] Subscription rejected, illegal request 06:36:53 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:53 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 303.502746][ T2939] ecryptfs_parse_options: eCryptfs: unrecognized option [] [ 303.523748][ T7] Subscription rejected, illegal request 06:36:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1600000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 303.557241][ T2939] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 303.577580][ T8977] Subscription rejected, illegal request 06:36:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) uselib(&(0x7f0000000280)='./file0\x00') r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r1, 0x502, 0x70bd2b, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x11}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x400c001}, 0x75304c52006c003e) [ 303.623745][ T2939] Error parsing options; rc = [-22] 06:36:53 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1300000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1800000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:53 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 303.791205][ T8977] Subscription rejected, illegal request 06:36:53 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x04') 06:36:53 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x8001000000000000, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c) [ 303.863343][ T749] Subscription rejected, illegal request 06:36:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x18, 0x6, 0x0, 0x3, 0x1}, 0x2c) 06:36:53 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) semget(0x2, 0x3, 0x1) semget(0x1, 0x3, 0x100) r1 = semget(0x2, 0x1, 0x404) semctl$IPC_RMID(r1, 0x0, 0x10) 06:36:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1500000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 304.040427][ T8977] Subscription rejected, illegal request [ 304.058836][ T3091] ecryptfs_parse_options: eCryptfs: unrecognized option [] 06:36:54 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x2) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 304.104367][ T7] Subscription rejected, illegal request [ 304.135473][ T3091] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x2, 0x3, 0x1}, 0x2c) 06:36:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x80}, 0x0, 0x0, &(0x7f0000000140)={0x800, 0x0, 0x8, 0x2}, &(0x7f0000000200)=0xb96, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x9}}, 0x10) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x30240, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x240, @local}) 06:36:54 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 304.195931][ T3091] Error parsing options; rc = [-22] 06:36:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1600000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) 06:36:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x3, 0x3, 0x1}, 0x2c) [ 304.350441][ T8195] Subscription rejected, illegal request 06:36:54 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x05') 06:36:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1800000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 304.406578][ T8195] Subscription rejected, illegal request 06:36:54 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x35) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) semget(0x1, 0x2, 0x40) 06:36:54 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x4, 0x3, 0x1}, 0x2c) [ 304.518158][ T3386] ecryptfs_parse_options: eCryptfs: unrecognized option [] [ 304.554306][ T3386] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4000000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 304.677743][ T3386] Error parsing options; rc = [-22] [ 304.687604][ T7] Subscription rejected, illegal request 06:36:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x5, 0x3, 0x1}, 0x2c) 06:36:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x8001000000000000, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 304.742490][ T749] Subscription rejected, illegal request 06:36:54 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x3500) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:54 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:54 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x06') 06:36:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x6, 0x3, 0x1}, 0x2c) 06:36:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x18, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) [ 305.019707][ T8977] Subscription rejected, illegal request [ 305.024891][ T3529] ecryptfs_parse_options: eCryptfs: unrecognized option [] 06:36:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) [ 305.081219][ T3529] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 305.082576][ T749] Subscription rejected, illegal request 06:36:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x7, 0x3, 0x1}, 0x2c) 06:36:54 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x4000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 305.145636][ T3529] Error parsing options; rc = [-22] 06:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x2}, 0x2c) 06:36:55 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:55 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\a') 06:36:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x8, 0x3, 0x1}, 0x2c) [ 305.331406][ T8977] Subscription rejected, illegal request 06:36:55 executing program 1: r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0xfffffffffffffd7d}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 305.385530][ T749] Subscription rejected, illegal request 06:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x2}, 0x2c) [ 305.439565][ T3682] ecryptfs_parse_options: eCryptfs: unrecognized option [] 06:36:55 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x1000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x9, 0x3, 0x1}, 0x2c) [ 305.523794][ T3682] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:55 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x4d, 0xffffffffffffff80, 0x87, 0x2, 0x5}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = dup3(r2, r1, 0x80000) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000a40)={0x1, 0x0, 0x2080, {0xd000, 0x1f000}, [], "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", "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"}) ioctl$VIDIOC_STREAMOFF(r3, 0x40045613, &(0x7f0000000080)=0x6e3) r4 = fcntl$getown(r1, 0x9) sendmsg$netlink(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)={0x3e4, 0x39, 0x102, 0x70bd25, 0x25dfdbfd, "", [@nested={0x114, 0x45, [@typed={0x8, 0x95, @ipv4=@multicast1}, @generic="cb89a6b7d7042a201e00c3f1bbad1f5e1a750fce6d2729aec0f34e2ae9b1aa750a7d812b94b36bf73998de220366ed7c342efe71e52ee5eb6a8ef68b9479f50517d36384b8e39d29ea2fa1fe54d6248ba6ee84a00fd541", @typed={0x8, 0x8c, @pid=r4}, @typed={0x8, 0x62, @u32=0x7}, @typed={0xc, 0x14, @str='ppp1\x00'}, @generic="a9d3df63b859a54e38744245e9d80757bb803950a1d0d8ac8eba54bbaa39cf48cc74b7add17ed4843ab28e9014db7612053095566f063135da0a0ffededfd0e467c9ad4f2d583e7ea7d8b052e4c1320c27dba90f8eb579fbf5bf4c7ff883f1818f2a29b7abc9a76879e5c925c61685a701f117eed13530fbcb44f6f6febeb93741139f4815b1ea0148df94f6ed15b164e5ffefc3"]}, @nested={0x2c0, 0x7e, [@typed={0x8, 0x1c, @ipv4=@local}, @generic="371385cc2df296534d0e50e1f913a4d95cff82a89a4d92b4c4272da6a802c12cc83a56462e86b4635f0500932681cc3ee5d07961b0fb2c57d68c8438ed550a20638e23b27a20df7012963231993bfb8f11967ae3840f4307eb7b5f863167e9214c0938d8734942daf57f610de3de453d151bd6843de2a39da209816a304a281796f19c4788b10d5482608e779ca8b1c24ea6f12217a2c0e5006f229b9e53937de37e570290800841915879665a181c411c4e4aff910ca005689d326d78fc664dd9be33dbd555b9479fca0db1455e5d96906986ecdf25f36c", @typed={0xcc, 0x5c, @binary="73dd803cf72a3004b7fdf763479444bc40f4d462d99c1426a6237829aff3fb5fd733f0e84a2f308333d91cbbe5b6155600ef701165f00828e8cf59a35945ecabb3b582f0ba86d539d5c62922f46c9221d0d43d8b6889251e94ea7388ec052e94d7bfc9997e003b452b3b80f3d20e042e2ffc4b74247d8e6cc9785dfff5ff12af1182812836d167c91428f37e9a410f50acd7cdfabe93a94c3c85dc991439a77d72c182b273e39d96bb1b4702a04a57c72cba40c05eeef54667cceb98cd737a44998609076b88a772"}, @typed={0x18, 0x8c, @binary="70bb31c0ff6754b65f9433d898645b86a2edd33e"}, @generic="072e7ade15a59d85bb5777df301ae398491ff99ac85638f89d0e094d5906389fd0c8437da844c1e706a57a5e5cf57c9e3bf8e6287d7200fb3e82aba2db201e6de9fb72f3e2c8b47f1373e6dc4cdb4296a1afdbdc6c869771037cded95e18ca24e84f3ceb6a6dedc40359cfebebbfc87102896380378139228b574d0322be587a55729c40bfc268ffcdfa3c37efe813b80757da3121c64f9882755e887f6d51b9fe77a7adfda437455063780fcbd554bbb8f0883dd6613a2c00be27cfce09c3c26a8d9b57789e18593ef71c8aecc53cab91c3fcd2e70c2b5357911f8e81625cfc2f4857fe54dd8ef483ca0fd8d9331eaa4747b8feb8"]}]}, 0x3e4}, {&(0x7f0000000600)={0x23c, 0x38, 0x10, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x22c, 0x8a, [@generic="dd313e3b41113d883b3868bfaaa7a1ed841b1e27cbd4feb08552407f0cd477783799ed85f778351e77699871f0239f426ef82c1dd648499b0f544a21252c3baa72d3ff279cbb025ff21024e0d0b3dc23de836a8818afc8eaaae5ee345d86e9e22210064645a3740be412bf9f7ef3279ae8076e50d17373b0aab22ffe7d70110ca3f86e1cadda2191d8b4888b9d4757d911abffeb235b628094f1cc269d4dd6f5f849284b12581113eca2b625ddbbba4191b0c7982272174138975a793d48c56db90eb995f12cce32804fd1e5fde906de6252fc42f86881d506c4c6ea932300ccb1", @generic="9765d586063e9edac3ba24ec9f51b5170a5692982ea9ea029ec8396669078a3e6ba2bdd0e3580fdb9035e0737aaba5b980db974790a7c10f31f3a5fe2b92fba896947913619ac2fcb1cdd4decdedf881b9d0119a7afe", @typed={0xf0, 0x72, @binary="eee621cbabc20055471e42bbf2f9c264113a588f1f2e2e2ab914c2ae4bae05c0f38ad2b08b6893ba7c65815e08ed6fc316750722956a425a144508d103e144b43c2830bd2616dbc94b54a244a84af91a61b903db316664fc6021fdfafa3bd78dc95044984b9c12880c9e67fad28bcb4ada4b3677fa0329ff7a12bce62264d8e2347f41059196b12d31d925c16694c712f31eca03c4306e7c57589860c9a3eff50db81a57273efa5ff955886aa974946dc610b206fdc5a991c3e8ae09df506f82f5abf26ca1068d8b8e7512facb861053afe9233be92f6a11983c70a9f4fcb8d4b8253b1471d0e70b26c4a972"}]}]}, 0x23c}, {&(0x7f0000000840)={0x1f0, 0x41, 0xc21, 0x70bd2b, 0x25dfdbff, "", [@nested={0x44, 0x10, [@typed={0x8, 0x68, @ipv4=@rand_addr=0x7}, @generic="e1d61682037079dc122f973d0b32b3fe6ee40065a5e18edea093858ee29d823e35efda2a8d504c7c7adf4b421673bd", @typed={0x8, 0x1b, @ipv4=@remote}]}, @nested={0x198, 0x38, [@generic="eba077733632cda922fb6b2fae6d41182f4055", @typed={0x1c, 0x5b, @str='em1:\x0e!keyringvboxnet0\x00'}, @generic="6277c5566904974cedfe5276a2a9e77dc58bd054f29eb1b5bbcca681b2b3692cdb8064d3549876a202c386c32d424ce6df4e53f84884cb90bdb3df852f38f420e61871effa8e6cebec6539a9bfe901ff05f4e8d8d77c94c971187cd5a637bd6cd3fac0ad726310558433e4677af18be2a4e1dfcaffe3135c863f695af24016e2a5afb6fcb1d0f53b770fa1477ef5", @generic="bc7bce43d02a8a6cabfc17d2139e0ee06411eaffa1f6ef9dd0763f5b8cea27d8b4022bd5f865dceac618747117283cdfa18a34b679199c2ea91835d1e2e956ea2cd355e2edf01687d3df2a4923c19b60639f60ec8eb65ab0db45b65de1f3605ad40c96a2341e0c7ca91474c29d5886dfd85117dc197aded72ed0a1a7a704b9f35f", @generic="64fed3237ac8a3ba3af583904e986ebbec713c8105a7f1b72aae6d55dafa778f3bbbda7be4f7050533d4e3970c7f2c1d09ea6057cfa7fd5033fd248e6370c9885a5810dbe272f2c4161140f964ee3d614225085d"]}, @nested={0x4, 0xe}]}, 0x1f0}], 0x3}, 0x40000) 06:36:55 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 305.610110][ T3682] Error parsing options; rc = [-22] 06:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x3}, 0x2c) 06:36:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xa, 0x3, 0x1}, 0x2c) [ 305.703486][ T8195] Subscription rejected, illegal request 06:36:55 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x2000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:55 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='H') 06:36:55 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x9, 0x1, 0x0, 0x100}, 0xc) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0xb84}, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x100000b, 0x40010, r0, 0x0) 06:36:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xb, 0x3, 0x1}, 0x2c) 06:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x4}, 0x2c) 06:36:55 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 305.978050][ T8977] Subscription rejected, illegal request [ 306.004601][ T3919] ecryptfs_parse_options: eCryptfs: unrecognized option [H] 06:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x5}, 0x2c) 06:36:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xc, 0x3, 0x1}, 0x2c) [ 306.025217][ T3919] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 306.053753][ T3919] Error parsing options; rc = [-22] [ 306.068455][ T8195] Subscription rejected, illegal request 06:36:55 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x35000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) prctl$PR_GET_THP_DISABLE(0x2a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0xfff, 0x10}, 0xc) 06:36:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x6}, 0x2c) 06:36:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xd, 0x3, 0x1}, 0x2c) 06:36:56 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 306.298342][ T749] Subscription rejected, illegal request 06:36:56 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='L') 06:36:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x7}, 0x2c) 06:36:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x23000000) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 306.413775][ T749] Subscription rejected, illegal request 06:36:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xe, 0x3, 0x1}, 0x2c) 06:36:56 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x40000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:56 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x8}, 0x2c) 06:36:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x8000000000ffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x2bf0000000000000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2}, &(0x7f0000000200)=0x8) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000340)={{0xd80c, 0x2}, 0x0, 0x120000000, 0x0, {0x4, 0x9}, 0x100, 0x5}) r3 = semget$private(0x0, 0x0, 0x10) semctl$IPC_RMID(r3, 0x0, 0x10) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000000)={0x4, 0xffffffffffff6a48, 0xbb9f}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000240)={0x7ff, 0x4, 0x7ff, 'queue1\x00', 0x9}) [ 306.577974][ T4163] ecryptfs_parse_options: eCryptfs: unrecognized option [L] [ 306.634844][ T4163] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 306.669928][ T4163] Error parsing options; rc = [-22] 06:36:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xf, 0x3, 0x1}, 0x2c) [ 306.706139][ T8195] Subscription rejected, illegal request 06:36:56 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 306.779424][ T7] Subscription rejected, illegal request 06:36:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x9}, 0x2c) 06:36:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x4, 0x82) semctl$IPC_RMID(r0, 0x0, 0x10) 06:36:56 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='`') 06:36:56 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x100000000000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x10, 0x3, 0x1}, 0x2c) 06:36:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xa}, 0x2c) 06:36:56 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 307.060188][ T4301] ecryptfs_parse_options: eCryptfs: unrecognized option [`] [ 307.083925][ T4301] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 307.101700][ T8195] Subscription rejected, illegal request 06:36:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000100)={@dev, @local, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000002f80)={@multicast1, @dev, 0x0}, &(0x7f0000002fc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000042c0)={'team0\x00', 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000004540)={&(0x7f0000004300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000004440)=[{&(0x7f0000004380)=""/177, 0xb1}], 0x1, &(0x7f0000004480)=""/177, 0xb1}, 0x20) accept$packet(0xffffffffffffff9c, &(0x7f0000004580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000045c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004600)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004640)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000046c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000005b40)={@multicast1, @local, 0x0}, &(0x7f0000005b80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006f80)={'veth1_to_bridge\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000006fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007000)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007040)={'ip6gre0\x00', 0x0}) recvmsg(0xffffffffffffff9c, &(0x7f0000007680)={&(0x7f00000073c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000075c0)=[{&(0x7f0000007440)=""/235, 0xeb}, {&(0x7f0000007540)=""/108, 0x6c}], 0x2, &(0x7f0000007600)=""/106, 0x6a}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000076c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000007b40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000007b00)={&(0x7f0000007700)=ANY=[@ANYBLOB="ec030000", @ANYRES16=r2, @ANYBLOB="020028bd7000fcdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="400002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ffffff7f08000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="fc00020040000100240001006c6200000000000000000000000000000000080003000b000000080004040200000008000600"/64, @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r10, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="380202003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400b778000008000600", @ANYRES32=r14, @ANYBLOB="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", @ANYRES32=r15, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400530b000008000600", @ANYRES32=r16, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040000000000"], 0x3ec}, 0x1, 0x0, 0x0, 0x80}, 0x20000841) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 307.142132][ T4301] Error parsing options; rc = [-22] [ 307.155618][ T8977] Subscription rejected, illegal request 06:36:57 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x200000000000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x11, 0x3, 0x1}, 0x2c) 06:36:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xb}, 0x2c) 06:36:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xc}, 0x2c) 06:36:57 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:57 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='h') 06:36:57 executing program 1: socket$caif_stream(0x25, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x2, 0x1, 0x0) semget(0x2, 0x3, 0x1) semget(0x2, 0x6, 0x9) semget(0x3, 0x2, 0xa) r0 = semget(0x3, 0x2, 0x1) semctl$IPC_RMID(r0, 0x0, 0x10) [ 307.419324][ T749] Subscription rejected, illegal request 06:36:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x12, 0x3, 0x1}, 0x2c) [ 307.473489][ T8195] Subscription rejected, illegal request 06:36:57 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x3500000000000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xd}, 0x2c) [ 307.563963][ T4441] ecryptfs_parse_options: eCryptfs: unrecognized option [h] [ 307.589087][ T4441] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 307.613231][ T4441] Error parsing options; rc = [-22] 06:36:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xe}, 0x2c) [ 307.696891][ T8195] Subscription rejected, illegal request 06:36:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x13, 0x3, 0x1}, 0x2c) 06:36:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x20040) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) semctl$IPC_RMID(0x0, 0x0, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r1, 0x80000001, 0x8, [0x8, 0xc6, 0xbe, 0xaa5, 0x4, 0xffffffff, 0x4, 0x1f]}, &(0x7f00000002c0)=0x18) [ 307.754685][ T8195] Subscription rejected, illegal request 06:36:57 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x4000000000000000) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x14, 0x3, 0x1}, 0x2c) 06:36:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xf}, 0x2c) [ 308.096577][ T7] Subscription rejected, illegal request 06:36:57 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:57 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='l') 06:36:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000040)) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x15, 0x3, 0x1}, 0x2c) 06:36:58 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0, 0x1d1}, 0x8) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x3}}, 0x18) 06:36:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x10}, 0x2c) [ 308.173971][ T8195] Subscription rejected, illegal request [ 308.293345][ T4687] ecryptfs_parse_options: eCryptfs: unrecognized option [l] 06:36:58 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8800, 0x0) 06:36:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x16, 0x3, 0x1}, 0x2c) [ 308.342818][ T4687] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x11}, 0x2c) 06:36:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x3, 0x2, 0x20) semctl$IPC_RMID(r0, 0x0, 0x10) [ 308.433744][ T4687] Error parsing options; rc = [-22] 06:36:58 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x12}, 0x2c) 06:36:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x18, 0x3, 0x1}, 0x2c) [ 308.547974][ T7] Subscription rejected, illegal request 06:36:58 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='t') 06:36:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x13}, 0x2c) 06:36:58 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1c) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffff, 0x20100) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 06:36:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x180, 0x3, 0x1}, 0x2c) 06:36:58 executing program 1: r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x3e5, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1973c873, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800000000}, r0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:58 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 308.776345][ T4925] ecryptfs_parse_options: eCryptfs: unrecognized option [t] [ 308.844788][ T4925] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:36:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x300, 0x3, 0x1}, 0x2c) 06:36:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x14}, 0x2c) 06:36:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x4, 0x3a) r0 = semget$private(0x0, 0x1, 0x1) semctl$IPC_RMID(r0, 0x0, 0x10) [ 308.918086][ T4925] Error parsing options; rc = [-22] 06:36:58 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x500, 0x3, 0x1}, 0x2c) 06:36:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x15}, 0x2c) 06:36:59 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='z') 06:36:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 309.281249][ T5067] ecryptfs_parse_options: eCryptfs: unrecognized option [z] [ 309.310067][ T5067] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 309.353766][ T5067] Error parsing options; rc = [-22] 06:36:59 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x40, 0x6}) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000000000080ffff000000"], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) getsockname$ax25(r0, &(0x7f0000000180)={{0x3, @netrom}, [@null, @remote, @null, @null, @netrom, @netrom, @rose]}, &(0x7f0000000200)=0x48) 06:36:59 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x600, 0x3, 0x1}, 0x2c) 06:36:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x16}, 0x2c) 06:36:59 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:59 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400002, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0x210, 0x120, 0x210, 0x120, 0x210, 0x328, 0x328, 0x328, 0x328, 0x328, 0x4, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d5, 0x4d6, 0x8, 0x9, 0x2}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x4, 0x3, 0x60000}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x7fff, 0x1f}, {0x4, 0x3, 0x4}}}}, {{@ipv6={@mcast2, @mcast1, [0xff000000, 0xffffffff, 0xffffff00, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffffff], 'team_slave_0\x00', 'syzkaller0\x00', {0xff}, {}, 0x62, 0x50000000000, 0x3}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000240)={0x81, 0x0, [0x2, 0xbd6, 0x5, 0x9]}) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x101, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x840) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000)=0x14, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 06:36:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x700, 0x3, 0x1}, 0x2c) 06:36:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x18}, 0x2c) [ 309.709587][ T5190] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 309.745335][ T5190] Error parsing options; rc = [-22] 06:36:59 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:36:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x4, 0x100) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_RMID(r0, 0x0, 0x10) 06:36:59 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000280)=""/253, 0xfd}, 0x2000000000000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x202000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000180)={0x3, 0x8, 0x1}) ioctl$SIOCRSACCEPT(r0, 0x89e3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000380)=[@in6={0xa, 0x4e24, 0x4, @mcast1, 0x7}, @in6={0xa, 0x4e20, 0x1f, @loopback, 0x4}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e21, 0x774c, @dev={0xfe, 0x80, [], 0x1e}, 0x4}, @in6={0xa, 0x4e21, 0x10000, @mcast2, 0x9}], 0xa0) 06:36:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x180}, 0x2c) 06:36:59 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:36:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x900, 0x3, 0x1}, 0x2c) 06:36:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x300}, 0x2c) [ 310.125889][ T5504] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:37:00 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:37:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xa00, 0x3, 0x1}, 0x2c) [ 310.167512][ T5504] Error parsing options; rc = [-22] 06:37:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getegid() semctl$IPC_RMID(0x0, 0x0, 0x10) 06:37:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x500}, 0x2c) 06:37:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xb00, 0x3, 0x1}, 0x2c) 06:37:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x600}, 0x2c) 06:37:00 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) init_module(&(0x7f0000000080)='em1\x00', 0x4, &(0x7f0000000180)='[cpuset.lo\x00') write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYBLOB="18a1be313b67106b5dfc5906e9ad808d71c44882ab4e9fcc66db5eff65a72c78a55d99c2ed53ab36e4c96930afb19ddc40046ce7d5d8bf888b5d692bc51d22fc9ec3ccedff016e5e04fcb5712d47dccf", @ANYRES64=r0, @ANYBLOB="69d403fa01dbe6d882793d9730ca92573442a1df818eea6393eef4336f6a533e333087a7289af665d9652f17c86d22710a8f339497a41d97d90e8f5c0c219ea94189c96b1ffc24682365a2372286ffd28d5cfce031a0b6d90f67e729239cc1eeebfaaf5a3eeef4eb01b7ef117bfb2ced3205406d5ab60a8c569936fae2b649343e1560a0bf6656517dabd9f50f8e840ba6d5680f4f3ae8b8b1492b8ef3fcc3f1cd4018ab5fc6bc928285eb68d9"], @ANYBLOB="37d308b34e15ab875acc6ebd5354180c252523c3ddd664d011b17fa503b1fd6c3485da45ec3dd86b9b948e2610d2f76341b15c0d0da21667b10cce2e67953f6f6ee7e25d773dda17674eb364e5a447612e904f27d41e93e5830eb893ebf1a62cf4b81092fcbb9c096201aa9c0348a8", @ANYPTR64=&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYBLOB="13b2b84157d2ffd1d46d7a074ee273d5e7bd508f12ec3dae78c9aeb01dae03f9cbf33a756c410d8cceda84c514d87f9cd7856bc38f8e1184029563dd107b8eb00284759256404ba9b7f9c5b7c86421c9d74c4d728baef290d4a2a6993b767b7eae601c98d6c4b584e9b4d6713f3dcc7a7872694397fee80d0e28878b5102a153f39ffd858ddac023d2efc749ec2c13d0928e18a12f869179b8db0e29d5252b3093d0", @ANYRES16=r0, @ANYRESHEX=r0, @ANYRES32=r0, @ANYPTR, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRESDEC=0x0, @ANYRESHEX=r0], @ANYRESOCT=0x0, @ANYRES64=r0, @ANYRES16, @ANYRESHEX=r0, @ANYRESOCT=0x0], @ANYRES64=0x0], 0x35c) r1 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x9, 0x200000) fstat(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000540)=[0xee01, 0xee00, 0x0, 0x0, 0xffffffffffffffff]) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuseblk\x00', 0x4020, &(0x7f00000009c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}, {@uid_gt={'uid>', r4}}]}}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000b80)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000ac0)={0x0, 0x2}, &(0x7f0000000b00)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000b40)={0x8, 0x1, 0x207, 0xffff, 0x9, 0x0, 0x10001, 0x2b2, r5}, 0x20) 06:37:00 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:37:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xc00, 0x3, 0x1}, 0x2c) 06:37:00 executing program 1: ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000080)={0x3e, 0x3, 0x3e}) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x2cc, 0x3e5, 0x0, 0x3ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0x40, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r1, &(0x7f0000000200)="7fc605f7140622118c79f545b7fbb6d5c6787d84d0463cd8388e4addfa714477baabeff60007ba949ec047503e70d67322c3b556331f7267fecf836887b097cc6411449992f1a4daa60b621eda266a8335ad445e9fb0aff2daaf172ce82b786520bb341487ee97136ddfc04157000f68eec85e7ac00db8edf8140e9b5ee9af0087b06a01c853e6d3f8220d6b8b2d23dd89ad218aa36ac90470f3bfe3", 0x9c, 0x80, &(0x7f00000002c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0xa7fd, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x18) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f00000000c0)) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000040)) 06:37:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x700}, 0x2c) 06:37:00 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:37:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x900}, 0x2c) 06:37:00 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) syncfs(r0) r1 = dup(r0) recvfrom$llc(r1, &(0x7f0000000000)=""/85, 0x55, 0x40010021, &(0x7f0000000080)={0x1a, 0x118, 0x5, 0x6, 0xa9c, 0x200, @remote}, 0x10) [ 310.961443][ T5662] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:37:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xd00, 0x3, 0x1}, 0x2c) [ 311.045880][ T5662] Error parsing options; rc = [-22] 06:37:00 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:37:00 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000440)=[{&(0x7f0000000180)=""/167, 0xa7}, {&(0x7f0000000280)=""/110, 0x6e}, {&(0x7f0000000300)=""/77, 0x4d}, {&(0x7f0000000380)=""/130, 0x82}], 0x4, &(0x7f0000000480)=""/171, 0xab}, 0x60) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000006c0), &(0x7f0000000700)=0x4) 06:37:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xe00, 0x3, 0x1}, 0x2c) 06:37:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xa00}, 0x2c) 06:37:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000240)={0x4, 0x70, 0x6, 0x7d0ab19e, 0x101, 0x8, 0x0, 0x29f8, 0x20100, 0x2, 0x5, 0x1f, 0xfffffffffffff800, 0x6, 0x800, 0x48c, 0xd4, 0x8, 0x7, 0x9, 0x7f, 0x6, 0x8004, 0x7, 0x20, 0x7, 0x3ff, 0x3, 0x400, 0x7f, 0xdeb5, 0xffffffffffff8001, 0x1fff1e9b, 0x7f, 0xe6, 0x8000, 0x6, 0x3, 0x0, 0x7, 0x6, @perf_bp={&(0x7f0000000200), 0x4}, 0x1000, 0x100000000, 0x4b1, 0x4, 0xffff, 0x7ff, 0x8}) r2 = accept4$llc(r1, 0x0, &(0x7f0000000080), 0x80000) getpeername$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) semget$private(0x0, 0x4, 0x200) semget$private(0x0, 0x3, 0x0) semget(0x2, 0x2, 0x100) semget(0x3, 0x3, 0x400) semget$private(0x0, 0x1, 0x500) semget(0x0, 0x0, 0x20) r3 = semget(0x0, 0x0, 0x2) semctl$IPC_RMID(r3, 0x0, 0x10) tee(r2, r0, 0x3, 0xd) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x100000001, 0x6, 0x100, 0x1, 0xa1f, 0x6, {0x0, @in6={{0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3c}}, 0x3, 0xfffffffffffffff9, 0x81, 0xdae, 0xa}}, &(0x7f0000000380)=0xb0) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000003c0)={r4, 0x1}, 0x8) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) 06:37:01 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') [ 311.284006][ T749] Subscription rejected, illegal request 06:37:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xf00, 0x3, 0x1}, 0x2c) 06:37:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xb00}, 0x2c) [ 311.353249][ T9081] Subscription rejected, illegal request 06:37:01 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:37:01 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000040)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300"/28], 0x1c) recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000000180)=""/90, 0x5a}, {&(0x7f0000000200)=""/22, 0x16}, {&(0x7f0000000280)=""/163, 0xa3}, {&(0x7f0000000340)=""/82, 0x52}, {&(0x7f00000003c0)=""/152, 0x98}], 0x6}, 0x40000000) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f00000006c0)=""/156, &(0x7f0000000540)=0x9c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) [ 311.497043][ T5807] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:37:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x1100, 0x3, 0x1}, 0x2c) 06:37:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xc00}, 0x2c) 06:37:01 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x62e) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {0x0}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x20040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x200, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'eth', 0x3a, 'nr0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r1, 0x2}) [ 311.610088][ T8977] Subscription rejected, illegal request [ 311.637968][ T5807] Error parsing options; rc = [-22] 06:37:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x1200, 0x3, 0x1}, 0x2c) 06:37:01 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) 06:37:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xd00}, 0x2c) 06:37:01 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)=' ') 06:37:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa6, 0x3}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='limits\x00') setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) 06:37:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xe00}, 0x2c) 06:37:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x1300, 0x3, 0x1}, 0x2c) [ 311.920482][ T5938] ecryptfs_parse_options: eCryptfs: unrecognized option [ ] [ 311.974508][ T5938] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:37:01 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 312.032071][ T5938] Error parsing options; rc = [-22] [ 312.395693][ T749] Subscription rejected, illegal request 06:37:02 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000180)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/53, 0x35}], 0x1, &(0x7f0000000580)=""/253, 0xfd}, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000800, &(0x7f0000000340)={[{@umask={'umask'}}, {@resize_size={'resize'}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) write$binfmt_elf64(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="7f454c460000000000e9d30200000060bc0000cc5cf344b7d8d31d64"], 0x1c) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) io_uring_setup(0x4bb, &(0x7f0000000280)={0x0, 0x0, 0x7, 0x20000000, 0x2dd}) 06:37:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x1400, 0x3, 0x1}, 0x2c) 06:37:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10100, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 06:37:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0xf00}, 0x2c) 06:37:02 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x00') 06:37:02 executing program 3: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000800)='raw\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00'}, &(0x7f00000006c0)=0x54) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat(r5, &(0x7f0000000500)='./file0\x00', 0x12100, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000780)={0x7, 0x70, 0x0, 0x8, 0x80, 0x21fc, 0x0, 0x9, 0x0, 0x2, 0x9, 0x80000000, 0xff, 0x421, 0x4cd8800000, 0x3, 0x0, 0x71, 0xc52d, 0xffffffffffff0001, 0x38, 0x6, 0x4, 0x5, 0x3d8e475, 0xffffffffffffff1f, 0x2, 0x1, 0x1f, 0x1000, 0xa0, 0x1, 0x101, 0x9, 0x40, 0x4, 0x80000000, 0xf3, 0x0, 0xffffffff00000000, 0x3, @perf_bp={&(0x7f0000000580), 0x8}, 0x1010, 0x10000, 0x3, 0x0, 0x1, 0x2b3, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r4, &(0x7f0000000380), 0x0}, 0x18) [ 312.522810][ T6070] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 06:37:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1, 0xffffffffffffffff, 0x1100}, 0x2c) 06:37:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x1500, 0x3, 0x1}, 0x2c) [ 312.631860][ T6070] Error parsing options; rc = [-22] [ 312.659634][ T6083] WARNING: CPU: 1 PID: 6083 at include/linux/cpumask.h:121 io_uring_setup+0x1399/0x1ac0 [ 312.669407][ T6083] Kernel panic - not syncing: panic_on_warn set ... [ 312.676015][ T6083] CPU: 1 PID: 6083 Comm: syz-executor.2 Not tainted 5.1.0-rc7-next-20190501 #34 [ 312.685037][ T6083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.691799][ T3875] kobject: 'loop3' (00000000a8ed16ca): kobject_uevent_env [ 312.695102][ T6083] Call Trace: [ 312.705508][ T6083] dump_stack+0x172/0x1f0 [ 312.709857][ T6083] ? io_uring_setup+0x1360/0x1ac0 [ 312.714900][ T6083] panic+0x2cb/0x75a [ 312.718839][ T6083] ? __warn_printk+0xf3/0xf3 [ 312.723448][ T6083] ? io_uring_setup+0x1399/0x1ac0 [ 312.728486][ T6083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.731525][ T3875] kobject: 'loop3' (00000000a8ed16ca): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 312.734756][ T6083] ? __warn.cold+0x5/0x47 [ 312.734778][ T6083] ? io_uring_setup+0x1399/0x1ac0 [ 312.734795][ T6083] __warn.cold+0x20/0x47 [ 312.734812][ T6083] ? io_uring_setup+0x1399/0x1ac0 [ 312.734835][ T6083] report_bug+0x263/0x2b0 [ 312.767989][ T6083] do_error_trap+0x11b/0x200 [ 312.772611][ T6083] do_invalid_op+0x37/0x50 [ 312.773907][ T3875] kobject: 'loop5' (0000000068062195): kobject_uevent_env [ 312.777044][ T6083] ? io_uring_setup+0x1399/0x1ac0 [ 312.777068][ T6083] invalid_op+0x14/0x20 [ 312.777083][ T6083] RIP: 0010:io_uring_setup+0x1399/0x1ac0 [ 312.777100][ T6083] Code: 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 f8 fd ff ff 4c 89 f7 e8 81 67 e0 ff e9 eb fd ff ff e8 a7 96 a7 ff <0f> 0b e9 27 f7 ff ff e8 9b 96 a7 ff 4c 89 ff e8 a3 eb 78 ff e9 fd [ 312.777108][ T6083] RSP: 0018:ffff888061567dc8 EFLAGS: 00010216 [ 312.825488][ T3875] kobject: 'loop5' (0000000068062195): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 312.826266][ T6083] RAX: 0000000000040000 RBX: 0000000020000000 RCX: ffffc9000a615000 [ 312.826276][ T6083] RDX: 0000000000000278 RSI: ffffffff81c97339 RDI: 0000000000000005 [ 312.826286][ T6083] RBP: ffff888061567ef0 R08: ffff888089abc400 R09: ffffed100c7e4d4c [ 312.826295][ T6083] R10: ffffed100c7e4d4b R11: ffff888063f26a5f R12: ffff888062109400 [ 312.826304][ T6083] R13: ffff888061567ec8 R14: ffff888062109440 R15: ffff888062109454 [ 312.826340][ T6083] ? io_uring_setup+0x1399/0x1ac0 [ 312.826362][ T6083] ? io_uring_setup+0x1399/0x1ac0 [ 312.886503][ T6083] ? io_uring_release+0x50/0x50 [ 312.891423][ T6083] ? nsecs_to_jiffies+0x30/0x30 [ 312.896303][ T6083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 312.901781][ T6083] ? do_syscall_64+0x26/0x670 [ 312.906477][ T6083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.912556][ T6083] ? do_syscall_64+0x26/0x670 [ 312.917293][ T6083] ? lockdep_hardirqs_on+0x418/0x5d0 [ 312.922615][ T6083] __x64_sys_io_uring_setup+0x54/0x80 [ 312.928010][ T6083] do_syscall_64+0x103/0x670 [ 312.932624][ T6083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.938613][ T6083] RIP: 0033:0x458da9 [ 312.942515][ T6083] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.953762][ T3875] kobject: 'loop5' (0000000068062195): kobject_uevent_env [ 312.962131][ T6083] RSP: 002b:00007fa5fd264c78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 312.962147][ T6083] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000458da9 [ 312.962154][ T6083] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 00000000000004bb [ 312.962161][ T6083] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 312.962170][ T6083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5fd2656d4 [ 312.962178][ T6083] R13: 00000000004bffde R14: 00000000004d2318 R15: 00000000ffffffff [ 312.970523][ T6083] Kernel Offset: disabled [ 313.023076][ T6083] Rebooting in 86400 seconds..