constprop.0+0x20/0x20 [ 1396.176202][T17973] vfs_fsync_range+0x7c/0x150 [ 1396.180894][T17973] ext4_buffered_write_iter+0x211/0x280 [ 1396.186435][T17973] ext4_file_write_iter+0xf4/0xd30 [ 1396.191611][T17973] ? common_file_perm+0x1d1/0x490 [ 1396.196646][T17973] do_iter_readv_writev+0x4a7/0x5d0 [ 1396.201852][T17973] do_iter_write+0x137/0x3a0 [ 1396.206456][T17973] ? __read_once_size+0x45/0xd0 [ 1396.211358][T17973] vfs_writev+0x118/0x1c0 [ 1396.215752][T17973] ? __rcu_read_unlock+0x66/0x2f0 [ 1396.220789][T17973] ? __fget_light+0xc0/0x1a0 [ 1396.225395][T17973] do_pwritev+0x129/0x1c0 [ 1396.229811][T17973] __x64_sys_pwritev+0x5e/0x80 [ 1396.234616][T17973] do_syscall_64+0xc7/0x390 [ 1396.239125][T17973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1396.245005][T17973] RIP: 0033:0x45c849 [ 1396.248898][T17973] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1396.268492][T17973] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1396.276896][T17973] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1396.284857][T17973] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1396.292862][T17973] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1396.300858][T17973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1396.308821][T17973] R13: 0000000000000871 R14: 00000000004cb2be R15: 0000000000000008 04:22:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)='\x00', 0x1}], 0x1, 0x0) [ 1396.341627][T17975] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1396.341627][T17975] LLnCq2] [ 1396.361992][T17986] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1396.361992][T17986] i:0.mC0w[:YH [ 1396.361992][T17986] #<^):4<] [ 1396.394967][T17975] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1396.410504][T17986] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1396.410504][T17986] LLnCq2] [ 1396.422817][T17975] Error parsing options; rc = [-22] [ 1396.428107][T17986] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1396.445158][T17986] Error parsing options; rc = [-22] [ 1403.622814][T17999] hfs: unable to parse mount options 04:22:40 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x050\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:22:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r8, 0x1}}, 0x18) 04:22:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x2}], 0x1, 0x0) 04:22:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ead2ce344a0ca8d4c20810c1ee732284214e05bf6e87a801040000ced1e382572db4cc42c641b231aca4205d85d5e2e8"], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x1000, 0x8}, 0xc) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @loopback}}, 0x1e) 04:22:40 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r1, &(0x7f00000001c0)='s', 0xffcf) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x48) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x4000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000140)={0x6, &(0x7f00000003c0)="69e3fa92ff9c"}) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000100)={0x0, 0x101000}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:22:40 executing program 1 (fault-call:4 fault-nth:9): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1403.953471][T18008] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1403.953471][T18008] i:0.mC0w[:YH [ 1403.953471][T18008] #<^):4<] [ 1404.035680][ T27] audit: type=1804 audit(1585887760.611:131): pid=18015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/341/cgroup.controllers" dev="sda1" ino=16690 res=1 [ 1404.039607][T18017] FAULT_INJECTION: forcing a failure. [ 1404.039607][T18017] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.074467][T18017] CPU: 1 PID: 18017 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1404.074505][T18008] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1404.074505][T18008] LLnCq2] [ 1404.083134][T18017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.083140][T18017] Call Trace: [ 1404.083170][T18017] dump_stack+0x11d/0x187 [ 1404.083193][T18017] should_fail.cold+0x5/0xf [ 1404.083225][T18017] __should_failslab+0x82/0xb0 [ 1404.121522][T18017] should_failslab+0x5/0xf [ 1404.125933][T18017] kmem_cache_alloc+0x23/0x5e0 [ 1404.130696][T18017] ? ext4_es_can_be_merged+0xef/0x1b0 [ 1404.136064][T18017] __es_insert_extent+0x1ee/0x870 [ 1404.141092][T18017] ext4_es_insert_extent+0x1c0/0x5d0 [ 1404.146414][T18017] ext4_map_blocks+0x3ca/0xcf0 [ 1404.151180][T18017] ? ext4_alloc_io_end_vec+0x123/0x160 [ 1404.156637][T18017] ext4_writepages+0x108b/0x1d40 [ 1404.161582][T18017] ? 0xffffffff81000000 [ 1404.165774][T18017] ? ext4_mark_inode_dirty+0x420/0x420 [ 1404.171295][T18017] ? do_writepages+0x6b/0x170 [ 1404.175965][T18017] do_writepages+0x6b/0x170 [ 1404.180465][T18017] ? _raw_spin_unlock+0x38/0x60 [ 1404.185322][T18017] ? wbc_attach_and_unlock_inode+0xdd/0x3b0 [ 1404.191224][T18017] __filemap_fdatawrite_range+0x1bb/0x220 [ 1404.196982][T18017] file_write_and_wait_range+0xfb/0x160 [ 1404.202525][T18017] ext4_sync_file+0x26e/0x8b0 [ 1404.207197][T18017] ? generic_perform_write+0x26a/0x320 [ 1404.212653][T18017] ? __read_once_size.constprop.0+0x20/0x20 [ 1404.218578][T18017] vfs_fsync_range+0x7c/0x150 [ 1404.223325][T18017] ext4_buffered_write_iter+0x211/0x280 [ 1404.228880][T18017] ext4_file_write_iter+0xf4/0xd30 [ 1404.234019][T18017] ? common_file_perm+0x1d1/0x490 [ 1404.239075][T18017] do_iter_readv_writev+0x4a7/0x5d0 [ 1404.244366][T18017] do_iter_write+0x137/0x3a0 [ 1404.248953][T18017] ? __read_once_size+0x45/0xd0 [ 1404.253802][T18017] vfs_writev+0x118/0x1c0 [ 1404.258165][T18017] ? __rcu_read_unlock+0x66/0x2f0 [ 1404.263209][T18017] ? __fget_light+0xc0/0x1a0 [ 1404.267797][T18017] do_pwritev+0x129/0x1c0 [ 1404.272128][T18017] __x64_sys_pwritev+0x5e/0x80 [ 1404.276902][T18017] do_syscall_64+0xc7/0x390 [ 1404.281436][T18017] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1404.287314][T18017] RIP: 0033:0x45c849 [ 1404.291204][T18017] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1404.310827][T18017] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1404.319230][T18017] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1404.327190][T18017] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1404.335147][T18017] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1404.343110][T18017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1404.351070][T18017] R13: 0000000000000871 R14: 00000000004cb2be R15: 0000000000000009 [ 1404.382218][T18024] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1404.382218][T18024] i:0.mC0w[:YH [ 1404.382218][T18024] #<^):4<] 04:22:41 executing program 1 (fault-call:4 fault-nth:10): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:22:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x3}], 0x1, 0x0) [ 1404.433720][T18008] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1404.455513][T18024] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1404.455513][T18024] LLnCq2] [ 1404.467742][T18008] Error parsing options; rc = [-22] [ 1404.473236][T18024] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1404.487074][T18024] Error parsing options; rc = [-22] [ 1404.539401][T18029] FAULT_INJECTION: forcing a failure. [ 1404.539401][T18029] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.552338][T18029] CPU: 0 PID: 18029 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1404.561010][T18029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.571069][T18029] Call Trace: [ 1404.574375][T18029] dump_stack+0x11d/0x187 [ 1404.578719][T18029] should_fail.cold+0x5/0xf [ 1404.583242][T18029] ? mempool_free+0x190/0x190 [ 1404.587938][T18029] __should_failslab+0x82/0xb0 [ 1404.592744][T18029] should_failslab+0x5/0xf [ 1404.597172][T18029] kmem_cache_alloc+0x23/0x5e0 [ 1404.602095][T18029] ? __this_cpu_preempt_check+0x3c/0x130 [ 1404.607741][T18029] ? mempool_free+0x190/0x190 [ 1404.612422][T18029] mempool_alloc_slab+0x21/0x30 [ 1404.617285][T18029] mempool_alloc+0x8d/0x280 [ 1404.621900][T18029] ? __unlock_page_memcg+0x3e/0xb0 [ 1404.627039][T18029] ? unlock_page_memcg+0x20/0x30 [ 1404.631987][T18029] bio_alloc_bioset+0x217/0x3d0 [ 1404.636858][T18029] ext4_bio_write_page+0x670/0xb56 [ 1404.642063][T18029] mpage_submit_page+0xd5/0x190 [ 1404.647049][T18029] mpage_map_and_submit_buffers+0x35d/0x610 [ 1404.652958][T18029] ? ext4_map_blocks+0x414/0xcf0 [ 1404.657982][T18029] ? ext4_alloc_io_end_vec+0x123/0x160 [ 1404.663452][T18029] ext4_writepages+0x1176/0x1d40 [ 1404.668479][T18029] ? 0xffffffff81000000 [ 1404.672661][T18029] ? ext4_mark_inode_dirty+0x420/0x420 [ 1404.678161][T18029] ? do_writepages+0x6b/0x170 [ 1404.682871][T18029] do_writepages+0x6b/0x170 [ 1404.686409][T18036] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1404.686409][T18036] i:0.mC0w[:YH [ 1404.686409][T18036] #<^):4<] [ 1404.687380][T18029] ? _raw_spin_unlock+0x38/0x60 [ 1404.687513][T18029] ? wbc_attach_and_unlock_inode+0xdd/0x3b0 [ 1404.719301][T18029] __filemap_fdatawrite_range+0x1bb/0x220 [ 1404.725207][T18029] file_write_and_wait_range+0xfb/0x160 [ 1404.730770][T18029] ext4_sync_file+0x26e/0x8b0 [ 1404.735484][T18029] ? generic_perform_write+0x26a/0x320 [ 1404.740959][T18029] ? __read_once_size.constprop.0+0x20/0x20 [ 1404.746866][T18029] vfs_fsync_range+0x7c/0x150 [ 1404.750976][T18036] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1404.750976][T18036] LLnCq2] [ 1404.751586][T18029] ext4_buffered_write_iter+0x211/0x280 [ 1404.751615][T18029] ext4_file_write_iter+0xf4/0xd30 [ 1404.773753][T18029] ? common_file_perm+0x1d1/0x490 [ 1404.778861][T18029] do_iter_readv_writev+0x4a7/0x5d0 04:22:41 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x060\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:22:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) [ 1404.783736][T18036] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1404.784070][T18029] do_iter_write+0x137/0x3a0 [ 1404.784090][T18029] ? __read_once_size+0x45/0xd0 [ 1404.784118][T18029] vfs_writev+0x118/0x1c0 [ 1404.810868][T18029] ? __rcu_read_unlock+0x66/0x2f0 [ 1404.815925][T18029] ? __fget_light+0xc0/0x1a0 [ 1404.820544][T18029] do_pwritev+0x129/0x1c0 [ 1404.824885][T18029] __x64_sys_pwritev+0x5e/0x80 [ 1404.829656][T18029] do_syscall_64+0xc7/0x390 [ 1404.834173][T18029] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1404.840069][T18029] RIP: 0033:0x45c849 [ 1404.843976][T18029] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1404.854735][T18036] Error parsing options; rc = [-22] [ 1404.863736][T18029] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1404.863758][T18029] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 04:22:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x4}], 0x1, 0x0) [ 1404.863768][T18029] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1404.863779][T18029] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1404.863790][T18029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1404.863810][T18029] R13: 0000000000000871 R14: 00000000004cb2be R15: 000000000000000a 04:22:41 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\a0\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1404.952182][ T27] audit: type=1804 audit(1585887761.531:132): pid=18043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/342/cgroup.controllers" dev="sda1" ino=16690 res=1 [ 1405.092269][T18052] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1405.092269][T18052] i:0.mC0w[:YH [ 1405.092269][T18052] #<^):4<] [ 1405.114342][T18052] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1405.114342][T18052] LLnCq2] [ 1405.126022][T18052] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:22:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x5}], 0x1, 0x0) [ 1405.139362][T18052] Error parsing options; rc = [-22] 04:22:41 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\b0\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:22:41 executing program 1 (fault-call:4 fault-nth:11): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:22:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="06ce988c0600b9b1c8752f9a70cb050ac2069bad591c3a6a941b2aade1ff784b9921b369a15fb7dce6c49afbc17d8aa983b3b4b37cbcdc4e89"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0xf, &(0x7f0000000100)='.:ppp1wlan0-&$\x00', 0xffffffffffffffff}, 0x30) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000000)) syz_open_procfs(r3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000002000)={0x182c, 0x3, 0x4, 0x0, 0x70bd2c, 0x25dfdbff, {0x2, 0x0, 0xa}, [@nested={0x1155, 0xb, 0x0, 0x1, [@generic="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", @typed={0x8, 0x74, 0x0, 0x0, @pid}, @typed={0xc, 0x1, 0x0, 0x0, @str='selinux\x00'}, @generic="6acfd3b5b282c75aa925df1f45d4655dcbe9c383a38b9a3f348f6d60f4946708e9ecb29c3350b4f896812bbe666f665ebd60023ca7bbf62f3dc0629aec018ce079abe6f987aef88250cf6c545e012426aafd9b656163dd9be8b864e881ef95d1f2e92ffc69ee28503a8fe6275a5cbb2b0f073ad50a8677c999009dcb94e1e82d78b432c15ababad6644b6a29caaabec4c97ad03d9d6d798213ecdc7276e646a6069d438247c57c1232d9d032c9fb6324b0b056e609966507ccf2fdf197687cd0a260cc737a826c82162d5bcdd5ea803dfd38997e66318245a2e6a759b1faa56897335dcc6c", @generic="2d49b2df6f600c3e21a74d397c6e4078c6c363207f08225891aa79253e1aa77cb55e472687695c54ed54e49bb8773b17b2adbe1ce9acc7d7123a9c122bc200ed0314ec5bc73b33a2f9bf9fa0a706a6ec", @typed={0x8, 0x73, 0x0, 0x0, @ipv4=@local}]}, @nested={0x1d9, 0x42, 0x0, 0x1, [@typed={0xd5, 0x31, 0x0, 0x0, @binary="d8490c0dfc9031dc32817ca5f096fd75ed847466e4029d736640df4de8460cc049c4ef241fc1ffd06cb81cf3b6c23e619500761d4e8612d5be865654cd259faa8ea5c053d51d80cede9cf533b4ef5788aec9deea066a0db7d3d2f01e6bba2096ba8cb33c22bdc43c2fac1d9838e6896d3fcf4d61c42b7ff496844c61049ed3d75af8dbaff61ee006ca06682817ed62ea813ba99a79f8699e5d44e5535962e2de12b63ec9ebd1992405ad1fef0a8be3c8806dba23d0e55adc4553c7dee7819002e3032c165afa4c2bdee8a5ba0d652884ae"}, @typed={0x22, 0x58, 0x0, 0x0, @str='!&em0#vmnet0)mime_type&]]proc\x00'}, @typed={0x14, 0x58, 0x0, 0x0, @ipv6=@remote}, @generic="0c12518a92ddf66d61188036ee285ed76078a6ad7b26a8814f275c69bbc69bf6dd5551ae3fee75792203470dc0ce41d725c12283a0ceb550beef3b7ee4ab7984ae989c71471e80bcc71a03d4fbe0240d800492157c52e69cbb77f7c84bb3f8451d35037b6a566d48019385853aaf6ce897cb2e687e951ec2558034bb4d7f4c1a55048a644930284247defc402e1a7076be238c2cdd413766ee1fd2da308a0d7911ecfb234b45510f1bf04460dc49c86af43ab4567a", @typed={0x8, 0xa, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x8, 0x3e, 0x0, 0x0, @u32=0x40}]}, @typed={0x5, 0x17, 0x0, 0x0, @str='\x00'}, @generic="69ba8db2a3e358a5f444c3369e8365e569f8fc440f494e93e3abf6bd6475c9f86e19c6c67fef2d00b9273d9415db926d61732a3e13a89296a56bbcd485917beef8f4bed8e0fb50ba7c0683ced0afc7306af35ce9dbc24c4e2017b165281f754496115ecc92e6a0cab8763a3cbf71f5c710525e40410bbb7c77c73404d0ebfcdf7365106bcc8b9687a55a44c005c1b6bc6ad8f7235671987301029a", @nested={0x2d3, 0x40, 0x0, 0x1, [@typed={0xc, 0x60, 0x0, 0x0, @u64=0x2}, @generic="09dca7a5b1f77568631b92b2d347", @generic="6195296e930d8bb0735ed0f7838fdf2b84174ca279c351985ed3b2d442f53dcb4fc019bcfb045faa30e66ea0da029be85a46b0c2bd6a3436d07c0b56d546b8d991fc6d58ed2c6c9d90dfb93d52f12023abdc5891ca0eeea7c1593e1c4fed25212c0cd316f212097f5a279b2e943fa1702e033826c8c700011e83865ee6ba327e78e2d9d4ae124f42b4dca054dd06788d5485f7fdd681e72b93fdd194cc82dd8e221b3531c6cf28ef5439f3ff2101a79e981320ea9c748c7806c2913217e6328ed0faad414d8db25485e4ee8fde94662886982a82d8400aa7ac731461d3f1e6ae146e23186bb6a33193cfd62d4c86e794380d8b93748d", @generic="06b0eb807430c20222c4dab473e0bed164934659ccaae863492df49dfc8b21cf35b3502b3fdd5f779e6c512cdd0d81c0a11a90d08323583bc67f3d4828e1a0e297d48e72b53225f5d3579dbde1b67987e097fb9b352301a1fbf1a70d44a7efbe91446917b26fcf473668b9f8e13118be1ca3cabcbcf801e78ea5f597898cb0250f3103a577ecc832e635bf927e2bc2e9a473733a7af8670de94e753d699f01e69834464922c9ae2bd8ebdd67cf7e2b3adc4c647778799af297e42da0df96ee6e4467f4b9493e3bb474a58d4b0f", @typed={0x8, 0x5d, 0x0, 0x0, @fd}, @generic="a04f22033a6d8a085242f74b7e0cfd5f7856269e56d8cf8b233e64f644cbc7f641b7e15cc1eec5a46efdc21f22799e23a6292f3f256dd0d90ad6048e016dce88fe5660375f2584a92860935df91f27f152a26db91575391fb1989ecc490d6a5941a61cfcb9123074232f88e194e7610faceecdd151d0d33fd276017e5127311976b844c19d4c81b5576e7a8a343cf7924811fc05464f07aafe665f391e5135e0024c97278759ed88e5ff1beef1635e164df15ae7e1e351995fad84f09ef5a2e593228c767f65069f27ee94b86e82aeddee9160b67e81d80eb7dcd2f7be6da2f3c678", @typed={0x8, 0x78, 0x0, 0x0, @pid=r2}]}, @typed={0xc, 0x73, 0x0, 0x0, @u64=0x5}, @typed={0x12, 0x11, 0x0, 0x0, @str='/dev/snapshot\x00'}, @generic="5fdca26a732f59039db7c9049e3a990c7ebe3abcc315368983742abe21fed335713003064883194581e82fdca1ab31ea2b3facc3d9ed59b28e9e218b6faff88f1ad6d2b6acb03c336145e9c8ab386f8b6134f1bfad36f5a25eed28835a39a7dcc0aff8c69639", @nested={0xe4, 0x1e, 0x0, 0x1, [@typed={0x8, 0x96, 0x0, 0x0, @fd=r4}, @generic="d1288265068d38bd9f8d685c22b910caafc12f0df3ebe6d688628b1378ff34d3a59dfec30d2abded69cbf92bb46e10e96a4cd94d49d613ff2f25d6cefeaa12d3be4e107ee5f989a790a18b61181b473e76dc7e4cfb0005f348e982e9cb531903ce2bc671f55e238ec6506a487d4f7b80b16f49ace9ac548545a381fe9a3d864361c05422f067707f5a4db4e272b9ab94f4d6b3519d37f576f7d6f7cae3aafa691f5ab882447a71cd33f7", @generic="ff7e1556f5f7f196f7e1e0d10d7d1ed1a852c74ea8d6c0", @generic="c88cde5dd3d4cc855aa976f1d6cad22c333c638151de3d"]}]}, 0x182c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) [ 1405.242522][T18059] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1405.242522][T18059] i:0.mC0w[:YH [ 1405.242522][T18059] #<^):4<] [ 1405.283955][T18065] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1405.283955][T18065] i:0.mC0w[:YH [ 1405.283955][T18065] #<^):4<] [ 1405.335280][T18071] FAULT_INJECTION: forcing a failure. [ 1405.335280][T18071] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.364690][T18071] CPU: 0 PID: 18071 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1405.373374][T18071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.383424][T18071] Call Trace: [ 1405.386812][T18071] dump_stack+0x11d/0x187 [ 1405.391158][T18071] should_fail.cold+0x5/0xf [ 1405.395680][T18071] ? mempool_free+0x190/0x190 [ 1405.400379][T18071] __should_failslab+0x82/0xb0 [ 1405.404027][T18065] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1405.404027][T18065] LLnCq2] [ 1405.405158][T18071] should_failslab+0x5/0xf [ 1405.420990][T18071] kmem_cache_alloc+0x23/0x5e0 [ 1405.425761][T18071] ? memcg_kmem_put_cache+0x77/0xc0 [ 1405.430955][T18071] ? debug_smp_processor_id+0x3f/0x129 [ 1405.436405][T18071] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1405.441438][T18071] ? mempool_free+0x190/0x190 [ 1405.446109][T18071] mempool_alloc_slab+0x21/0x30 [ 1405.451029][T18071] mempool_alloc+0x8d/0x280 [ 1405.455523][T18071] ? mempool_alloc_slab+0x29/0x30 [ 1405.460696][T18071] ? mempool_alloc+0x9f/0x280 [ 1405.465374][T18071] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1405.471292][T18071] bvec_alloc+0x13d/0x1e0 [ 1405.475636][T18071] bio_alloc_bioset+0x2ad/0x3d0 [ 1405.480544][T18071] ext4_bio_write_page+0x670/0xb56 [ 1405.485679][T18071] mpage_submit_page+0xd5/0x190 [ 1405.490614][T18071] mpage_map_and_submit_buffers+0x35d/0x610 [ 1405.496515][T18071] ? ext4_map_blocks+0x414/0xcf0 [ 1405.501460][T18071] ? ext4_alloc_io_end_vec+0x123/0x160 [ 1405.506927][T18071] ext4_writepages+0x1176/0x1d40 [ 1405.511868][T18071] ? 0xffffffff81000000 [ 1405.516108][T18071] ? ext4_mark_inode_dirty+0x420/0x420 [ 1405.521559][T18071] ? do_writepages+0x6b/0x170 [ 1405.526296][T18071] do_writepages+0x6b/0x170 [ 1405.530799][T18071] ? _raw_spin_unlock+0x38/0x60 [ 1405.535644][T18071] ? wbc_attach_and_unlock_inode+0xdd/0x3b0 [ 1405.541648][T18071] __filemap_fdatawrite_range+0x1bb/0x220 [ 1405.547385][T18071] file_write_and_wait_range+0xfb/0x160 [ 1405.552928][T18071] ext4_sync_file+0x26e/0x8b0 [ 1405.557628][T18071] ? generic_perform_write+0x26a/0x320 [ 1405.563154][T18071] ? __read_once_size.constprop.0+0x20/0x20 [ 1405.569089][T18071] vfs_fsync_range+0x7c/0x150 [ 1405.573789][T18071] ext4_buffered_write_iter+0x211/0x280 [ 1405.579342][T18071] ext4_file_write_iter+0xf4/0xd30 [ 1405.584590][T18071] ? common_file_perm+0x1d1/0x490 [ 1405.589615][T18071] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1405.595508][T18071] do_iter_readv_writev+0x4a7/0x5d0 [ 1405.600717][T18071] do_iter_write+0x137/0x3a0 [ 1405.605351][T18071] ? __read_once_size+0x45/0xd0 [ 1405.610200][T18071] vfs_writev+0x118/0x1c0 [ 1405.614612][T18071] ? __rcu_read_unlock+0x66/0x2f0 [ 1405.619642][T18071] ? __fget_light+0xc0/0x1a0 [ 1405.624229][T18071] do_pwritev+0x129/0x1c0 [ 1405.628679][T18071] __x64_sys_pwritev+0x5e/0x80 [ 1405.633486][T18071] do_syscall_64+0xc7/0x390 [ 1405.637989][T18071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1405.643905][T18071] RIP: 0033:0x45c849 [ 1405.647805][T18071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1405.667511][T18071] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1405.675916][T18071] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1405.683889][T18071] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1405.691852][T18071] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1405.699813][T18071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1405.707774][T18071] R13: 0000000000000871 R14: 00000000004cb2be R15: 000000000000000b [ 1405.716093][T18065] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1405.728776][T18059] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1405.728776][T18059] LLnCq2] [ 1405.730994][T18065] Error parsing options; rc = [-22] [ 1405.762547][T18059] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1405.778367][T18059] Error parsing options; rc = [-22] 04:22:50 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x112, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x1010, 0x0, 0x0, 0x9, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sched_setattr(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x1, 0x44080) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000280)=[@mss, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r2, &(0x7f0000002980), 0x22a, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000340), 0x4) close(r2) r3 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r3, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x767b, 0x2, [0x0, 0x7]}, 0xc) r4 = open(0x0, 0xe4180, 0xb5) socket$alg(0x26, 0x5, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x4, 0x8010, r5, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = accept$unix(r4, 0x0, &(0x7f0000000240)) ioctl$FICLONE(r1, 0x40049409, r6) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000f4ffff86908e51030008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:22:50 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x6}], 0x1, 0x0) 04:22:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) 04:22:50 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\n0\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:22:50 executing program 1 (fault-call:4 fault-nth:12): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:22:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="790776118674bc8d015bc627ee1f4a50418b78243f1d8ec85f48c2e730c2da224b20cc7bac69136288ab57704c4fb18b073112fb6cb483f9aa665ca5385c0f6d0e6ee46916db483ca87c9efb414892693af7041f651b96010824567874c2ac986c0cfb901f0b239aa4413f4a76792127d693409171c0c33538ad3ef45f6f832e57cb49ae6a33810b85cfd1033b22445d6c88099781bb37f16b9143ac38bf5b0ca99a9a430abe4a28d806d1a28c4a2d94c0e958fd96611d75e0e72829eda9ce1a3c4e57879761cfecafdc522786"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 1413.718588][T18095] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1413.718588][T18095] i: [ 1413.718588][T18095] 0.mC0w[:YH [ 1413.718588][T18095] #<^):4<] [ 1413.738576][T18092] FAULT_INJECTION: forcing a failure. [ 1413.738576][T18092] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.756149][T18099] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1413.756149][T18099] i: [ 1413.756149][T18099] 0.mC0w[:YH [ 1413.756149][T18099] #<^):4<] [ 1413.768102][T18092] CPU: 1 PID: 18092 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1413.788088][T18092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1413.792997][T18095] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1413.792997][T18095] LLnCq2] [ 1413.798135][T18092] Call Trace: [ 1413.798165][T18092] dump_stack+0x11d/0x187 [ 1413.798253][T18092] should_fail.cold+0x5/0xf [ 1413.798298][T18092] __should_failslab+0x82/0xb0 [ 1413.821858][T18099] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1413.821858][T18099] LLnCq2] [ 1413.826591][T18092] should_failslab+0x5/0xf [ 1413.826669][T18092] kmem_cache_alloc_node+0x35/0x680 [ 1413.839162][T18095] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1413.842564][T18092] ? __getblk_gfp+0x63/0x560 [ 1413.842648][T18092] ? unlock_page+0x80/0xc0 [ 1413.847869][T18095] Error parsing options; rc = [-22] [ 1413.860931][T18092] create_task_io_context+0x56/0x270 [ 1413.861059][T18092] generic_make_request_checks+0xeed/0x1030 [ 1413.866603][T18099] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1413.870027][T18092] ? __read_once_size+0xb7/0x100 [ 1413.870061][T18092] generic_make_request+0x3e/0x700 [ 1413.875577][T18099] Error parsing options; rc = [-22] [ 1413.880642][T18092] ? mpage_release_unused_pages+0x3b8/0x460 [ 1413.880666][T18092] submit_bio+0x8f/0x3a0 [ 1413.880692][T18092] ? ext4_mark_inode_dirty+0xf3/0x420 [ 1413.930423][T18092] ext4_io_submit+0xdf/0x110 [ 1413.935022][T18092] ext4_writepages+0xd4e/0x1d40 [ 1413.939939][T18092] ? 0xffffffff81000000 [ 1413.944183][T18092] ? ext4_mark_inode_dirty+0x420/0x420 [ 1413.949261][T18102] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1413.949261][T18102] i:0.mC0w[:YH [ 1413.949261][T18102] #<^):4<] [ 1413.949665][T18092] ? do_writepages+0x6b/0x170 [ 1413.973764][T18104] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1413.973764][T18104] i:0.mC0w[:YH [ 1413.973764][T18104] #<^):4<] [ 1413.975550][T18092] do_writepages+0x6b/0x170 [ 1413.975580][T18092] ? _raw_spin_unlock+0x38/0x60 [ 1413.996929][T18102] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1413.996929][T18102] LLnCq2] [ 1414.001279][T18092] ? wbc_attach_and_unlock_inode+0xdd/0x3b0 [ 1414.001305][T18092] __filemap_fdatawrite_range+0x1bb/0x220 [ 1414.001338][T18092] file_write_and_wait_range+0xfb/0x160 [ 1414.007017][T18102] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1414.017615][T18092] ext4_sync_file+0x26e/0x8b0 [ 1414.017638][T18092] ? generic_perform_write+0x26a/0x320 [ 1414.017691][T18092] ? __read_once_size.constprop.0+0x20/0x20 04:22:50 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x100\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:22:50 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x120\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1414.023925][T18104] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1414.023925][T18104] LLnCq2] [ 1414.029293][T18092] vfs_fsync_range+0x7c/0x150 [ 1414.029323][T18092] ext4_buffered_write_iter+0x211/0x280 [ 1414.035158][T18104] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1414.047847][T18092] ext4_file_write_iter+0xf4/0xd30 [ 1414.047885][T18092] ? common_file_perm+0x1d1/0x490 [ 1414.052815][T18102] Error parsing options; rc = [-22] [ 1414.057992][T18092] do_iter_readv_writev+0x4a7/0x5d0 [ 1414.058024][T18092] do_iter_write+0x137/0x3a0 [ 1414.064220][T18104] Error parsing options; rc = [-22] [ 1414.075340][T18092] ? __read_once_size+0x45/0xd0 [ 1414.075387][T18092] vfs_writev+0x118/0x1c0 [ 1414.075417][T18092] ? __rcu_read_unlock+0x66/0x2f0 [ 1414.143141][T18092] ? __fget_light+0xc0/0x1a0 [ 1414.146288][T18107] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1414.146288][T18107] i:0.mC0w[:YH [ 1414.146288][T18107] #<^):4<] [ 1414.147846][T18092] do_pwritev+0x129/0x1c0 [ 1414.147877][T18092] __x64_sys_pwritev+0x5e/0x80 [ 1414.172040][T18109] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1414.172040][T18109] i:0.mC0w[:YH [ 1414.172040][T18109] #<^):4<] [ 1414.173270][T18092] do_syscall_64+0xc7/0x390 [ 1414.173301][T18092] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1414.178296][T18109] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1414.178296][T18109] LLnCq2] [ 1414.199117][T18092] RIP: 0033:0x45c849 [ 1414.199141][T18092] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1414.199150][T18092] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1414.206414][T18107] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1414.206414][T18107] LLnCq2] 04:22:50 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7}], 0x1, 0x0) 04:22:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) [ 1414.209545][T18092] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1414.209555][T18092] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1414.209565][T18092] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1414.209597][T18092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1414.209618][T18092] R13: 0000000000000871 R14: 00000000004cb2be R15: 000000000000000c [ 1414.221443][T18109] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:22:50 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x8}], 0x1, 0x0) 04:22:50 executing program 1 (fault-call:4 fault-nth:13): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1414.455077][ T27] audit: type=1804 audit(1585887771.031:133): pid=18123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/344/cgroup.controllers" dev="sda1" ino=16842 res=1 [ 1414.479441][T18107] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1414.503161][T18107] Error parsing options; rc = [-22] [ 1414.509835][T18109] Error parsing options; rc = [-22] [ 1414.529153][T18128] FAULT_INJECTION: forcing a failure. [ 1414.529153][T18128] name failslab, interval 1, probability 0, space 0, times 0 [ 1414.542351][T18128] CPU: 0 PID: 18128 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1414.551027][T18128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.561085][T18128] Call Trace: [ 1414.564389][T18128] dump_stack+0x11d/0x187 [ 1414.568731][T18128] should_fail.cold+0x5/0xf [ 1414.573239][T18128] ? mempool_free+0x190/0x190 [ 1414.577923][T18128] __should_failslab+0x82/0xb0 [ 1414.582693][T18128] should_failslab+0x5/0xf [ 1414.587123][T18128] kmem_cache_alloc+0x23/0x5e0 [ 1414.591895][T18128] ? __find_get_block+0x243/0x740 [ 1414.596934][T18128] ? __read_once_size.constprop.0+0xd/0x20 [ 1414.602752][T18128] ? mempool_free+0x190/0x190 [ 1414.607465][T18128] mempool_alloc_slab+0x21/0x30 [ 1414.612435][T18128] mempool_alloc+0x8d/0x280 [ 1414.616992][T18128] ? find_get_pages_range_tag+0x65e/0x6e0 [ 1414.622725][T18128] ? _raw_spin_unlock_irq+0x55/0x80 [ 1414.627929][T18128] bio_alloc_bioset+0x217/0x3d0 [ 1414.632787][T18128] ? __ext4_get_inode_loc+0x27a/0x990 [ 1414.638281][T18128] submit_bh_wbc+0x133/0x460 [ 1414.642904][T18128] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1414.648812][T18128] __sync_dirty_buffer+0xd9/0x210 [ 1414.653901][T18128] sync_dirty_buffer+0x21/0x30 [ 1414.658686][T18128] ext4_write_inode+0x31a/0x330 [ 1414.663567][T18128] __writeback_single_inode+0x722/0x910 [ 1414.669157][T18128] writeback_single_inode+0x219/0x2f0 [ 1414.674543][T18128] sync_inode_metadata+0x75/0xa0 [ 1414.679503][T18128] ext4_sync_file+0x47a/0x8b0 [ 1414.684238][T18128] ? __read_once_size.constprop.0+0x20/0x20 [ 1414.690206][T18128] vfs_fsync_range+0x7c/0x150 [ 1414.694892][T18128] ext4_buffered_write_iter+0x211/0x280 [ 1414.700445][T18128] ext4_file_write_iter+0xf4/0xd30 [ 1414.705567][T18128] ? common_file_perm+0x1d1/0x490 [ 1414.710594][T18128] do_iter_readv_writev+0x4a7/0x5d0 [ 1414.715796][T18128] do_iter_write+0x137/0x3a0 [ 1414.720440][T18128] ? __read_once_size+0x45/0xd0 [ 1414.725284][T18128] vfs_writev+0x118/0x1c0 [ 1414.729676][T18128] ? __rcu_read_unlock+0x66/0x2f0 [ 1414.734693][T18128] ? __fget_light+0xc0/0x1a0 [ 1414.739277][T18128] do_pwritev+0x129/0x1c0 [ 1414.743596][T18128] __x64_sys_pwritev+0x5e/0x80 [ 1414.748360][T18128] do_syscall_64+0xc7/0x390 [ 1414.752914][T18128] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1414.758797][T18128] RIP: 0033:0x45c849 [ 1414.762705][T18128] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1414.782297][T18128] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1414.790732][T18128] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1414.798681][T18128] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1414.806648][T18128] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1414.814608][T18128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1414.822629][T18128] R13: 0000000000000871 R14: 00000000004cb2be R15: 000000000000000d 04:22:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfa, 0x4008001, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 04:22:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 04:22:59 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x9}], 0x1, 0x0) 04:22:59 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2:0\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:22:59 executing program 1 (fault-call:4 fault-nth:14): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:22:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r7, 0x1}}, 0x18) [ 1423.036157][T18148] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1423.036157][T18148] i::0.mC0w[:YH [ 1423.036157][T18148] #<^):4<] [ 1423.059879][T18144] FAULT_INJECTION: forcing a failure. [ 1423.059879][T18144] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.082661][T18144] CPU: 0 PID: 18144 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1423.090093][T18148] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1423.090093][T18148] LLnCq2] [ 1423.091343][T18144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1423.091348][T18144] Call Trace: [ 1423.091376][T18144] dump_stack+0x11d/0x187 [ 1423.091398][T18144] should_fail.cold+0x5/0xf [ 1423.091421][T18144] ? mempool_free+0x190/0x190 [ 1423.091442][T18144] __should_failslab+0x82/0xb0 04:22:59 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xa}], 0x1, 0x0) [ 1423.091461][T18144] should_failslab+0x5/0xf [ 1423.091555][T18144] kmem_cache_alloc+0x23/0x5e0 [ 1423.091587][T18144] ? bit_wait_timeout+0x90/0x90 [ 1423.119137][T18152] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1423.119137][T18152] i::0.mC0w[:YH [ 1423.119137][T18152] #<^):4<] [ 1423.120683][T18144] ? schedule+0x4b/0xe0 [ 1423.120756][T18144] ? mempool_free+0x190/0x190 [ 1423.132876][T18152] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1423.132876][T18152] LLnCq2] [ 1423.134596][T18144] mempool_alloc_slab+0x21/0x30 [ 1423.134653][T18144] mempool_alloc+0x8d/0x280 [ 1423.141881][T18152] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1423.143778][T18144] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1423.143806][T18144] bio_alloc_bioset+0x217/0x3d0 [ 1423.149049][T18148] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1423.169706][T18144] ? ext4_write_inode+0x9f/0x330 [ 1423.169727][T18144] ? __rcu_read_unlock+0x66/0x2f0 [ 1423.169754][T18144] submit_bh_wbc+0x133/0x460 [ 1423.220649][T18152] Error parsing options; rc = [-22] [ 1423.223117][T18144] ? __list_del_entry_valid+0x83/0x8e [ 1423.223135][T18144] ? __write_once_size.constprop.0+0xd/0x20 [ 1423.223243][T18144] write_dirty_buffer+0x7d/0xf0 [ 1423.252193][T18148] Error parsing options; rc = [-22] [ 1423.255867][T18144] sync_mapping_buffers+0x2b8/0x720 [ 1423.255883][T18144] ? __read_once_size+0x45/0xd0 04:22:59 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xb}], 0x1, 0x0) [ 1423.255908][T18144] ? __read_once_size.constprop.0+0x1/0x20 [ 1423.255933][T18144] ? 0xffffffff81000000 [ 1423.297285][T18144] ext4_sync_file+0x564/0x8b0 [ 1423.301981][T18144] ? __read_once_size.constprop.0+0x20/0x20 [ 1423.307903][T18144] vfs_fsync_range+0x7c/0x150 [ 1423.312589][T18144] ext4_buffered_write_iter+0x211/0x280 [ 1423.318192][T18144] ext4_file_write_iter+0xf4/0xd30 [ 1423.323319][T18144] ? common_file_perm+0x1d1/0x490 [ 1423.328362][T18144] do_iter_readv_writev+0x4a7/0x5d0 04:22:59 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\xee0\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1423.333641][T18144] do_iter_write+0x137/0x3a0 [ 1423.338239][T18144] ? __read_once_size+0x45/0xd0 [ 1423.343100][T18144] vfs_writev+0x118/0x1c0 [ 1423.347479][T18144] ? __rcu_read_unlock+0x66/0x2f0 [ 1423.352526][T18144] ? __fget_light+0xc0/0x1a0 [ 1423.357168][T18144] do_pwritev+0x129/0x1c0 [ 1423.361511][T18144] __x64_sys_pwritev+0x5e/0x80 [ 1423.366350][T18144] do_syscall_64+0xc7/0x390 [ 1423.370864][T18144] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1423.376829][T18144] RIP: 0033:0x45c849 [ 1423.380736][T18144] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1423.400346][T18144] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1423.408768][T18144] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1423.416739][T18144] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1423.424710][T18144] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1423.432683][T18144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1423.440658][T18144] R13: 0000000000000871 R14: 00000000004cb2be R15: 000000000000000e [ 1423.448894][ T27] audit: type=1804 audit(1585887779.661:134): pid=18143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/345/cgroup.controllers" dev="sda1" ino=16836 res=1 [ 1423.492234][T18165] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1423.492234][T18165] i:0.mC0w[:YH [ 1423.492234][T18165] #<^):4<] [ 1423.516253][T18168] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1423.516253][T18168] i:0.mC0w[:YH [ 1423.516253][T18168] #<^):4<] 04:23:00 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xc}], 0x1, 0x0) [ 1423.537562][T18165] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1423.537562][T18165] LLnCq2] [ 1423.549309][T18168] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1423.549309][T18168] LLnCq2] [ 1423.560923][T18165] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1423.574072][T18168] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x1c}}, 0x20000000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'], 0x1) fallocate(r2, 0x3, 0x0, 0x8020003) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x301081, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x3c, r4, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048051) [ 1423.599361][T18165] Error parsing options; rc = [-22] [ 1423.614641][T18168] Error parsing options; rc = [-22] 04:23:00 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04\n\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1423.777833][T18179] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1423.777833][T18179] i: [ 1423.777833][T18179] .mC0w[:YH [ 1423.777833][T18179] #<^):4<] [ 1423.828634][T18179] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1423.828634][T18179] LLnCq2] [ 1423.840213][T18179] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1423.853864][T18179] Error parsing options; rc = [-22] 04:23:07 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xf}], 0x1, 0x0) 04:23:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r7, 0x1}}, 0x18) 04:23:07 executing program 1 (fault-call:4 fault-nth:15): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:23:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) fcntl$setstatus(r1, 0x4, 0x4400) fallocate(r0, 0x3, 0x0, 0x8020003) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="040000004000"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="03000000000000000000000008010000595826a31d99c397"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4080) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) 04:23:07 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04#\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="cf2aecf58a04d89c06000000000000001907f8022c3128d6c3867209fca9a5d9929c35189bdd88b4", @ANYBLOB="a7b74aad84a9d68309edfe37d385a7c5959249093c6547c70921cd03f191f3b525328e92fad8556bc8405672662be6236747a6cdb02d4d678ce828c53466ba9d95a678640848d2e5fa8b4739d9fb4ec579bc7a30ec20e05a0b5dcfe211d1755bf6bb14b485a0d6a6724374261746f10994fa01a66be0fc9fd9bdfce251f154d450b76dc3f22a21ead024ccc0a4c86fedcf3a4901cb156caaf2f5a8d666324c752a9236f92118a2c8a49ca698a4016b1cfcb4fd38cee0af619e338a49a6ead474300ded21659909a68752a79af3878b421a4011e7d256ab6fdfb0cd97288fa612429734f191c49e27c1d399a0f7281583"], 0x0, 0x120}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/6, 0x6}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000140)={0x2, 0x1, 0x0, 0x1a, 0x16e, &(0x7f0000000440)="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"}) [ 1431.431152][T18196] FAULT_INJECTION: forcing a failure. [ 1431.431152][T18196] name failslab, interval 1, probability 0, space 0, times 0 [ 1431.458939][T18196] CPU: 1 PID: 18196 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1431.461402][T18204] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1431.461402][T18204] i:#.mC0w[:YH [ 1431.461402][T18204] #<^):4<] [ 1431.467621][T18196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1431.467627][T18196] Call Trace: [ 1431.467780][T18196] dump_stack+0x11d/0x187 [ 1431.506412][T18196] should_fail.cold+0x5/0xf [ 1431.510950][T18196] ? mempool_free+0x190/0x190 [ 1431.515620][T18196] __should_failslab+0x82/0xb0 [ 1431.520379][T18196] should_failslab+0x5/0xf [ 1431.524794][T18196] kmem_cache_alloc+0x23/0x5e0 [ 1431.529555][T18196] ? bit_wait_timeout+0x90/0x90 [ 1431.534410][T18196] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1431.540325][T18196] ? __read_once_size+0x2f/0xd0 [ 1431.545174][T18196] ? mempool_free+0x190/0x190 [ 1431.549855][T18196] mempool_alloc_slab+0x21/0x30 [ 1431.554707][T18196] mempool_alloc+0x8d/0x280 [ 1431.559213][T18196] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1431.565213][T18196] ? __read_once_size+0x45/0xd0 [ 1431.570063][T18196] ? _raw_spin_unlock+0x38/0x60 [ 1431.574964][T18196] bio_alloc_bioset+0x217/0x3d0 [ 1431.579950][T18196] ? _atomic_dec_and_lock+0x96/0xf0 [ 1431.585212][T18196] blkdev_issue_flush+0x95/0x1a0 [ 1431.590254][T18196] ext4_sync_file+0x64d/0x8b0 [ 1431.594950][T18196] ? __read_once_size.constprop.0+0x20/0x20 [ 1431.600847][T18196] vfs_fsync_range+0x7c/0x150 [ 1431.605552][T18196] ext4_buffered_write_iter+0x211/0x280 [ 1431.611096][T18196] ext4_file_write_iter+0xf4/0xd30 [ 1431.616218][T18196] ? common_file_perm+0x1d1/0x490 [ 1431.621252][T18196] do_iter_readv_writev+0x4a7/0x5d0 [ 1431.626538][T18196] do_iter_write+0x137/0x3a0 [ 1431.631132][T18196] ? __read_once_size+0x45/0xd0 [ 1431.635992][T18196] vfs_writev+0x118/0x1c0 [ 1431.640419][T18196] ? __rcu_read_unlock+0x66/0x2f0 [ 1431.645458][T18196] ? __fget_light+0xc0/0x1a0 [ 1431.650054][T18196] do_pwritev+0x129/0x1c0 [ 1431.654469][T18196] __x64_sys_pwritev+0x5e/0x80 [ 1431.659239][T18196] do_syscall_64+0xc7/0x390 [ 1431.663815][T18196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1431.669758][T18196] RIP: 0033:0x45c849 [ 1431.673713][T18196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1431.693327][T18196] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1431.701732][T18196] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1431.709697][T18196] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1431.717668][T18196] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1431.725632][T18196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1431.733611][T18196] R13: 0000000000000871 R14: 00000000004cb2be R15: 000000000000000f [ 1431.742933][T18204] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1431.742933][T18204] LLnCq2] [ 1431.752709][ T27] audit: type=1804 audit(1585887788.331:135): pid=18200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/346/cgroup.controllers" dev="sda1" ino=16769 res=1 [ 1431.758740][T18206] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1431.758740][T18206] i:#.mC0w[:YH [ 1431.758740][T18206] #<^):4<] [ 1431.802234][T18204] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1431.815921][T18204] Error parsing options; rc = [-22] [ 1431.822152][T18206] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY 04:23:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04%\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:08 executing program 1 (fault-call:4 fault-nth:16): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1431.822152][T18206] LLnCq2] [ 1431.852837][T18206] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x10}], 0x1, 0x0) [ 1431.881388][T18206] Error parsing options; rc = [-22] [ 1431.980846][T18216] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1431.980846][T18216] i:%.mC0w[:YH [ 1431.980846][T18216] #<^):4<] [ 1432.004770][T18221] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1432.004770][T18221] i:%.mC0w[:YH [ 1432.004770][T18221] #<^):4<] 04:23:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r7, 0x1}}, 0x18) [ 1432.035578][T18221] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1432.035578][T18221] LLnCq2] [ 1432.037472][T18220] FAULT_INJECTION: forcing a failure. [ 1432.037472][T18220] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.061500][T18221] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0x3}, &(0x7f0000000080)=0x28) exit_group(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x0, 0x0, 0xf}, 0x0, 0x0, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r2, 0x3, 0x0, 0x8020003) [ 1432.091701][T18216] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1432.091701][T18216] LLnCq2] [ 1432.117875][T18221] Error parsing options; rc = [-22] [ 1432.152721][T18216] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1432.165915][T18220] CPU: 0 PID: 18220 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1432.174590][T18220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1432.184654][T18220] Call Trace: [ 1432.187956][T18220] dump_stack+0x11d/0x187 [ 1432.192300][T18220] should_fail.cold+0x5/0xf [ 1432.196845][T18220] ? mempool_free+0x190/0x190 [ 1432.201574][T18220] __should_failslab+0x82/0xb0 [ 1432.206372][T18220] should_failslab+0x5/0xf [ 1432.210792][T18220] kmem_cache_alloc+0x23/0x5e0 [ 1432.215568][T18220] ? bit_wait_timeout+0x90/0x90 [ 1432.220434][T18220] ? schedule+0x4b/0xe0 [ 1432.224614][T18220] ? mempool_free+0x190/0x190 [ 1432.229296][T18220] mempool_alloc_slab+0x21/0x30 [ 1432.234171][T18220] mempool_alloc+0x8d/0x280 [ 1432.238675][T18220] ? __read_once_size+0xb7/0x100 [ 1432.243783][T18220] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1432.249676][T18220] ? __read_once_size+0x45/0xd0 [ 1432.254605][T18220] ? _raw_spin_unlock+0x38/0x60 [ 1432.259456][T18220] bio_alloc_bioset+0x217/0x3d0 [ 1432.264306][T18220] ? _atomic_dec_and_lock+0x96/0xf0 [ 1432.269511][T18220] blkdev_issue_flush+0x95/0x1a0 [ 1432.274499][T18220] ext4_sync_file+0x64d/0x8b0 [ 1432.279174][T18220] ? __read_once_size.constprop.0+0x20/0x20 [ 1432.285060][T18220] vfs_fsync_range+0x7c/0x150 [ 1432.289739][T18220] ext4_buffered_write_iter+0x211/0x280 [ 1432.295294][T18220] ext4_file_write_iter+0xf4/0xd30 [ 1432.300432][T18220] ? common_file_perm+0x1d1/0x490 [ 1432.305457][T18220] do_iter_readv_writev+0x4a7/0x5d0 [ 1432.310662][T18220] do_iter_write+0x137/0x3a0 [ 1432.315310][T18220] ? __read_once_size+0x45/0xd0 [ 1432.320157][T18220] vfs_writev+0x118/0x1c0 [ 1432.324503][T18220] ? __rcu_read_unlock+0x66/0x2f0 [ 1432.329546][T18220] ? __fget_light+0xc0/0x1a0 [ 1432.334138][T18220] do_pwritev+0x129/0x1c0 [ 1432.338536][T18220] __x64_sys_pwritev+0x5e/0x80 [ 1432.343406][T18220] do_syscall_64+0xc7/0x390 [ 1432.347911][T18220] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1432.353912][T18220] RIP: 0033:0x45c849 [ 1432.357893][T18220] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1432.377490][T18220] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1432.385929][T18220] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1432.393940][T18220] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 04:23:09 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x23}], 0x1, 0x0) [ 1432.401913][T18220] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1432.409890][T18220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1432.417874][T18220] R13: 0000000000000871 R14: 00000000004cb2be R15: 0000000000000010 [ 1432.426660][T18216] Error parsing options; rc = [-22] 04:23:09 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04+\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1432.446361][ T27] audit: type=1804 audit(1585887789.021:136): pid=18225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/347/cgroup.controllers" dev="sda1" ino=16769 res=1 04:23:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="849c2d09065b5a7c501e3f041bad05335263dfc041ee822222c5151012787bde8f98bb5bfa93161b75e9210685a340ff2f"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000000)={0x688, 0x3, 0x7f, 0xfff, 0x40}) 04:23:09 executing program 1 (fault-call:4 fault-nth:17): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:23:09 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x46}], 0x1, 0x0) [ 1432.635922][T18245] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1432.635922][T18245] i:+.mC0w[:YH [ 1432.635922][T18245] #<^):4<] [ 1432.670718][T18249] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1432.670718][T18249] i:+.mC0w[:YH [ 1432.670718][T18249] #<^):4<] [ 1432.692345][T18245] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1432.692345][T18245] LLnCq2] [ 1432.721964][T18249] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1432.721964][T18249] LLnCq2] [ 1432.735584][T18251] FAULT_INJECTION: forcing a failure. [ 1432.735584][T18251] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.736966][T18245] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1432.755986][T18251] CPU: 0 PID: 18251 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1432.764358][T18249] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1432.770001][T18251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1432.770006][T18251] Call Trace: [ 1432.770036][T18251] dump_stack+0x11d/0x187 [ 1432.770061][T18251] should_fail.cold+0x5/0xf [ 1432.770200][T18251] ? mempool_free+0x190/0x190 [ 1432.810081][T18251] __should_failslab+0x82/0xb0 [ 1432.814846][T18251] should_failslab+0x5/0xf [ 1432.819256][T18251] kmem_cache_alloc+0x23/0x5e0 [ 1432.825154][T18251] ? bit_wait_timeout+0x90/0x90 [ 1432.829997][T18251] ? schedule+0x4b/0xe0 [ 1432.834152][T18251] ? mempool_free+0x190/0x190 [ 1432.838866][T18251] mempool_alloc_slab+0x21/0x30 [ 1432.843707][T18251] mempool_alloc+0x8d/0x280 [ 1432.848202][T18251] ? __read_once_size+0xb7/0x100 [ 1432.853141][T18251] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1432.859031][T18251] ? __read_once_size+0x45/0xd0 [ 1432.863878][T18251] ? _raw_spin_unlock+0x38/0x60 [ 1432.868774][T18251] bio_alloc_bioset+0x217/0x3d0 [ 1432.873622][T18251] ? _atomic_dec_and_lock+0x96/0xf0 [ 1432.878823][T18251] blkdev_issue_flush+0x95/0x1a0 [ 1432.883770][T18251] ext4_sync_file+0x64d/0x8b0 [ 1432.888491][T18251] ? __read_once_size.constprop.0+0x20/0x20 [ 1432.894396][T18251] vfs_fsync_range+0x7c/0x150 [ 1432.899083][T18251] ext4_buffered_write_iter+0x211/0x280 [ 1432.904637][T18251] ext4_file_write_iter+0xf4/0xd30 [ 1432.909832][T18251] ? common_file_perm+0x1d1/0x490 [ 1432.914858][T18251] do_iter_readv_writev+0x4a7/0x5d0 [ 1432.920056][T18251] do_iter_write+0x137/0x3a0 [ 1432.924639][T18251] ? __read_once_size+0x45/0xd0 [ 1432.929572][T18251] vfs_writev+0x118/0x1c0 [ 1432.933895][T18251] ? __rcu_read_unlock+0x66/0x2f0 [ 1432.938962][T18251] ? __fget_light+0xc0/0x1a0 [ 1432.943550][T18251] do_pwritev+0x129/0x1c0 [ 1432.947885][T18251] __x64_sys_pwritev+0x5e/0x80 [ 1432.952651][T18251] do_syscall_64+0xc7/0x390 [ 1432.957284][T18251] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1432.963239][T18251] RIP: 0033:0x45c849 [ 1432.967251][T18251] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1432.986856][T18251] RSP: 002b:00007f2a0f0e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1432.995259][T18251] RAX: ffffffffffffffda RBX: 00007f2a0f0e56d4 RCX: 000000000045c849 [ 1433.003219][T18251] RDX: 0000000000000001 RSI: 0000000020001380 RDI: 0000000000000003 [ 1433.011183][T18251] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1433.019167][T18251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1433.027140][T18251] R13: 0000000000000871 R14: 00000000004cb2be R15: 0000000000000011 04:23:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r1, @ANYBLOB="eba700001aa000fcffff05"], 0x3}}, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r6, 0x1}}, 0x18) [ 1433.036891][T18245] Error parsing options; rc = [-22] [ 1433.042479][T18249] Error parsing options; rc = [-22] [ 1433.186424][ T27] audit: type=1804 audit(1585887789.761:137): pid=18260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/348/cgroup.controllers" dev="sda1" ino=16756 res=1 04:23:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40003, 0x100, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={0x0, &(0x7f0000000100)=""/164, &(0x7f00000001c0)="5634b1a8df20ec3dad171e0f21d32fed05db9d9eab023d93f0bad242ed3f73092683c78ec96af19dd04973bde96176126b86fd0b62cfdeae28236f5c49bf7cd6a2dc6a3dbda309e9cd07874acc6f243aa86287c35bf5f401ea8f7374cf643396fc5272b98ae662b5119b798b9a991d009365c71d625db48bd6fa88910c111e1ecd6b464960a36642527ea7c8e319a18341303a57df71e21a2b", &(0x7f0000000440)="56c9be2646229c121339735efb10a8e2e06f5fe648dc16412c1b2b52f53c3b38c2d2a7ddc402a6659234d9155e151d163bedc66ad55b3fb3352590c3a7f5d3b593cf57c38047d012319badcc0b007f034191fcd46884759c7bc87bd69f5261fe6ecba9db2afac67c64ecaaf3975626178986866168239203ed0a744390fd423a2560fc297099abf7fd56d27e5de02a931a7749b342eb001b802cb6e06e4137b19ca665a458ede64069056a11fce9ef3f7e941c88bf24", 0x8, r1, 0x4}, 0x38) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) creat(&(0x7f0000000040)='./file1\x00', 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="cee835c5663f02f7e7"], 0x3) openat$tun(0xffffffffffffff9c, 0x0, 0x286603, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) 04:23:16 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04-\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:16 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x300}], 0x1, 0x0) 04:23:16 executing program 1 (fault-call:4 fault-nth:18): r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:23:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="300ce774ae31e53916445a7fa1475c79"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 04:23:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r5, 0x1}}, 0x18) [ 1439.720095][T18276] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1439.720095][T18276] i:-.mC0w[:YH [ 1439.720095][T18276] #<^):4<] [ 1439.750492][T18282] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1439.750492][T18282] i:-.mC0w[:YH [ 1439.750492][T18282] #<^):4<] [ 1439.783134][T18276] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1439.783134][T18276] LLnCq2] [ 1439.787880][T18282] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1439.787880][T18282] LLnCq2] 04:23:16 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:23:16 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x500}], 0x1, 0x0) [ 1439.810384][T18276] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1439.829438][ T27] audit: type=1804 audit(1585887796.411:138): pid=18289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/349/cgroup.controllers" dev="sda1" ino=16890 res=1 04:23:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r4, 0x1}}, 0x18) [ 1439.919287][T18282] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1439.935837][T18276] Error parsing options; rc = [-22] [ 1439.941580][T18282] Error parsing options; rc = [-22] 04:23:16 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="03", 0x1}], 0x1, 0x0) 04:23:16 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04/\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="1353a3b7462f945d76ed77ba930731911f5f26579118258797029623c4943303b7c7347aa086c3af301dce978288efc5ecf404c89b6a6cf0268c68824c1e6ef5b477386336c6bcbc4b0be00900b3cf9c92ac142143398f32504c73da1b0193e9666131462d307b504c1110730da710c6395b93f5afd9d350b620000000000000002062e4e103dd89ac91d902f837010ccddc44456c2117ee6e82d77a9ccfa4eeedb644cdd344fd31cf285473d04cfdf3459b1807268d35d4d35db032160d33ce27"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 1440.090887][ T27] audit: type=1804 audit(1585887796.671:139): pid=18299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/350/cgroup.controllers" dev="sda1" ino=16869 res=1 [ 1440.167139][T18310] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1440.167139][T18310] i:/.mC0w[:YH [ 1440.167139][T18310] #<^):4<] [ 1440.208016][T18314] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1440.208016][T18314] i:/.mC0w[:YH [ 1440.208016][T18314] #<^):4<] [ 1440.231843][T18310] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1440.231843][T18310] LLnCq2] [ 1440.243695][T18314] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1440.243695][T18314] LLnCq2] [ 1440.268150][T18310] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1440.281694][T18314] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1440.295947][T18310] Error parsing options; rc = [-22] [ 1440.301528][T18314] Error parsing options; rc = [-22] [ 1448.324618][T18330] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1448.333253][T18330] FAT-fs (loop4): Filesystem has been set read-only 04:23:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x10200, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cr0={0x0, 0x40010010}], 0x1000000000000123) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:23:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1100}], 0x1, 0x0) 04:23:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="04", 0x1}], 0x1, 0x0) 04:23:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r4, 0x1}}, 0x18) 04:23:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04:\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ef3a3d463c"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x4f, 0x0, 0x3c, 0x8fde, 0x3, 0x6, 0x8001, 0x63, 0x38, 0x141, 0x37a, 0x4, 0x20, 0x2, 0x480}, [{0x4, 0x4, 0x9, 0x953, 0x7, 0x9, 0xffffffff, 0x2040000}], "59fce5e6fe49debb6f4113d3006330bd3e4ce4d1c1da2e5cbe45e01d67ba4265c3ed2c016a26", [[], [], []]}, 0x37e) fallocate(r0, 0x3, 0x0, 0x8020003) [ 1448.441108][T18341] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1448.441108][T18341] i::.mC0w[:YH [ 1448.441108][T18341] #<^):4<] [ 1448.478794][T18341] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1448.478794][T18341] LLnCq2] 04:23:25 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)='\b', 0x1}], 0x1, 0x0) [ 1448.517183][ T27] audit: type=1804 audit(1585887805.091:140): pid=18351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/351/cgroup.controllers" dev="sda1" ino=16904 res=1 [ 1448.523050][T18344] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1448.523050][T18344] i::.mC0w[:YH [ 1448.523050][T18344] #<^):4<] 04:23:25 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1700}], 0x1, 0x0) [ 1448.587718][T18341] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$tipc(0x1e, 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:23:25 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04\\\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1448.658429][T18341] Error parsing options; rc = [-22] [ 1448.671704][T18344] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1448.671704][T18344] LLnCq2] [ 1448.698261][T18344] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1448.712204][T18344] Error parsing options; rc = [-22] 04:23:25 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)='\t', 0x1}], 0x1, 0x0) 04:23:25 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x4000}], 0x1, 0x0) [ 1448.877573][T18373] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1448.877573][T18373] i:\.mC0w[:YH [ 1448.877573][T18373] #<^):4<] [ 1448.901039][ T27] audit: type=1804 audit(1585887805.481:141): pid=18367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/352/cgroup.controllers" dev="sda1" ino=16902 res=1 [ 1448.927826][T18373] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1448.927826][T18373] LLnCq2] [ 1448.949339][T18374] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1448.949339][T18374] i:\.mC0w[:YH [ 1448.949339][T18374] #<^):4<] [ 1448.973644][T18373] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1449.013609][T18373] Error parsing options; rc = [-22] [ 1449.018770][T18374] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1449.018770][T18374] LLnCq2] [ 1449.032053][T18374] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1449.046983][T18374] Error parsing options; rc = [-22] 04:23:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)='\n', 0x1}], 0x1, 0x0) 04:23:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000080)) 04:23:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:23:34 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x4100}], 0x1, 0x0) 04:23:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x04\xee\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:34 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x400, 0x0, 0x25dfdbfb, {}, [""]}, 0x1c}}, 0x20000010) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x210, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x0, 0x7fffffff, 0x40, 0xcfd5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24000800}, 0x40) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) shutdown(0xffffffffffffffff, 0x1) listen(r0, 0x4) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 1457.874080][T18392] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1457.874080][T18392] i:.mC0w[:YH [ 1457.874080][T18392] #<^):4<] [ 1457.918950][T18392] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1457.918950][T18392] LLnCq2] [ 1457.942272][T18392] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="0f", 0x1}], 0x1, 0x0) 04:23:34 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7100}], 0x1, 0x0) [ 1457.975424][T18392] Error parsing options; rc = [-22] 04:23:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\xee\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1457.998184][ T27] audit: type=1804 audit(1585887814.571:142): pid=18410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/353/cgroup.controllers" dev="sda1" ino=16882 res=1 04:23:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="10", 0x1}], 0x1, 0x0) [ 1458.100268][T18419] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1458.100268][T18419] i:0.mC0w[:YH [ 1458.100268][T18419] #<^):4<] 04:23:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:23:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffc000000000000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) [ 1458.154212][T18419] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1458.154212][T18419] LLnCq2] 04:23:34 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7200}], 0x1, 0x0) [ 1458.208766][T18419] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1458.268786][T18419] Error parsing options; rc = [-22] 04:23:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="e0", 0x1}], 0x1, 0x0) 04:23:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\n\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1458.368948][ T27] audit: type=1804 audit(1585887814.941:143): pid=18431 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/354/cgroup.controllers" dev="sda1" ino=16610 res=1 04:23:35 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7300}], 0x1, 0x0) [ 1458.428502][T18446] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1458.428502][T18446] i:0 [ 1458.428502][T18446] .mC0w[:YH [ 1458.428502][T18446] #<^):4<] 04:23:35 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)='\x00', 0x1}], 0x1, 0x0) [ 1458.529900][T18446] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1458.529900][T18446] LLnCq2] [ 1458.583943][T18446] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1458.603587][T18446] Error parsing options; rc = [-22] 04:23:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:23:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) 04:23:41 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0:\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="e0", 0x1}], 0x1, 0x0) 04:23:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) getpid() r0 = socket(0x10, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) r2 = getpid() syslog(0x9, &(0x7f0000000240)=""/115, 0x73) sched_setscheduler(r2, 0x5, &(0x7f0000000000)) syz_open_procfs(r2, 0x0) mq_notify(r1, &(0x7f0000000200)={0x0, 0x11, 0x0, @tid=r2}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a5075d8829b08f7f4aae00"}) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000080)={'tunl0\x00', @ifru_flags}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) socketpair(0x6, 0x3, 0xa6de, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}]}, 0x24}, 0x1, 0x0, 0x0, 0x9a4894985b2a2252}, 0x8051) 04:23:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7400}], 0x1, 0x0) [ 1465.236084][T18470] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1465.236084][T18470] i:0:.mC0w[:YH [ 1465.236084][T18470] #<^):4<] 04:23:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)='\x00', 0x1}], 0x1, 0x0) [ 1465.322872][T18470] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1465.322872][T18470] LLnCq2] [ 1465.341684][ T27] audit: type=1804 audit(1585887821.921:144): pid=18472 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/355/cgroup.controllers" dev="sda1" ino=16933 res=1 04:23:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7500}], 0x1, 0x0) [ 1465.348883][T18480] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1465.348883][T18480] i:0:.mC0w[:YH [ 1465.348883][T18480] #<^):4<] [ 1465.397807][T18470] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) [ 1465.434655][T18470] Error parsing options; rc = [-22] [ 1465.440560][T18480] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1465.440560][T18480] LLnCq2] [ 1465.452430][T18480] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1465.466637][T18480] Error parsing options; rc = [-22] 04:23:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="79dc1286734584e56388cb6ce6555bb7e038c955aa3846dce11173eff94288a118c4b0013f95575bb10926cd3cfa9e568e34439df3d8ffcd939aa84f8c1ff55465a5"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000000)=0x7) 04:23:42 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="e0", 0x1}], 0x1, 0x0) 04:23:42 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x8100}], 0x1, 0x0) 04:23:42 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0]\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1465.702812][T18508] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1465.702812][T18508] i:0].mC0w[:YH [ 1465.702812][T18508] #<^):4<] [ 1465.724024][ T27] audit: type=1804 audit(1585887822.301:145): pid=18500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/356/cgroup.controllers" dev="sda1" ino=16926 res=1 04:23:42 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xf000}], 0x1, 0x0) [ 1465.725893][T18512] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1465.725893][T18512] i:0].mC0w[:YH [ 1465.725893][T18512] #<^):4<] [ 1465.764797][T18508] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1465.764797][T18508] LLnCq2] [ 1465.783160][T18508] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1465.796864][T18508] Error parsing options; rc = [-22] [ 1465.828376][T18512] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1465.828376][T18512] LLnCq2] [ 1465.849145][T18512] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:23:42 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\xee\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1465.874546][T18512] Error parsing options; rc = [-22] [ 1466.030355][T18528] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1466.030355][T18528] i:0.mC0w[:YH [ 1466.030355][T18528] #<^):4<] [ 1466.063086][T18533] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1466.063086][T18533] i:0.mC0w[:YH [ 1466.063086][T18533] #<^):4<] [ 1466.071147][T18528] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1466.071147][T18528] LLnCq2] [ 1466.084279][ T27] audit: type=1804 audit(1585887822.641:146): pid=18526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/357/cgroup.controllers" dev="sda1" ino=16871 res=1 [ 1466.084498][T18533] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1466.084498][T18533] LLnCq2] [ 1466.126144][T18528] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1466.133627][T18533] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1466.159352][T18533] Error parsing options; rc = [-22] [ 1466.164581][T18528] Error parsing options; rc = [-22] 04:23:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000001c0)='s', 0xffcf) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x5, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) 04:23:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)='\x00', 0x1}], 0x1, 0x0) 04:23:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfdef}], 0x1, 0x0) 04:23:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:23:51 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0xf76bf60f04d154d, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttynull\x00', 0x80, 0x0) fcntl$dupfd(r1, 0x406, r2) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = fanotify_init(0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="9472616e733d665001000000000000", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c2c886edc26f22d3c6f000000000068d102"]) 04:23:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\xee\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1474.684183][T18549] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1474.684183][T18549] i:0.mC0w[:YH [ 1474.684183][T18549] #<^):4<] [ 1474.738840][T18549] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1474.738840][T18549] LLnCq2] 04:23:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x20003041}], 0x1, 0x0) 04:23:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="e0", 0x1}], 0x1, 0x0) [ 1474.773642][ T27] audit: type=1804 audit(1585887831.351:147): pid=18555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/358/cgroup.controllers" dev="sda1" ino=16957 res=1 [ 1474.777227][T18549] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8\n\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1474.847034][T18549] Error parsing options; rc = [-22] 04:23:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:23:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x2}], 0x1, 0x0) 04:23:51 executing program 2: clone(0x20002004dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xffffffffffffffff, 0x40000}, 0x0, 0x0, r0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x114) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f00000001c0)={0x4, [0x0, 0x0, 0x0, 0x0]}) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="4cf9a242fd79"], 0x1) pwrite64(r1, &(0x7f0000000240)="790aceeed293714ef97fa1f408102ab81fe271461a4066f362a1e5cc0c8405d20d8c36de6e98a05b29a3f91b62ffc60c35204df941dee471bc7e0d8feebd8d092ab45f5b3654022b59d38d18b76b49365d3160202d6a86dd93f3dff4ae0815f4744244e6fdd3fa7864292206ad6fc746ab7d2907b1ed8b968f160d8a9099b5d41f90c824fbe24bc351566abe3820dd5442b5df547dfd8231d123726507096c369063144d4cbacba34b9c90daca0ab8c1136abe6912d8c7d546bdcc6d2a264ebb34c51fa783327ce31ac981bfe00863866e854a190f045e3f9d584055156b469907a3b92333c59a3e2a00b2d98a3a80c6685974807c26b51600"/264, 0x108, 0x450c) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) close(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000380)=""/156) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)={0x4, 0x2, 0x7, 0x6, 0xd, "0d372eb38c32f505"}) fallocate(r2, 0x3, 0x0, 0x8020003) [ 1475.018175][T18572] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1475.018175][T18572] i:0 [ 1475.018175][T18572] mC0w[:YH [ 1475.018175][T18572] #<^):4<] [ 1475.081190][T18572] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1475.081190][T18572] LLnCq2] [ 1475.124294][ T27] audit: type=1804 audit(1585887831.701:148): pid=18575 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/359/cgroup.controllers" dev="sda1" ino=16945 res=1 [ 1475.124654][T18572] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:23:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1475.182086][T18572] Error parsing options; rc = [-22] 04:23:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8%\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x3}], 0x1, 0x0) 04:23:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 1475.356953][T18596] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1475.356953][T18596] i:0%mC0w[:YH [ 1475.356953][T18596] #<^):4<] [ 1475.397822][ T27] audit: type=1804 audit(1585887831.971:149): pid=18599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/360/cgroup.controllers" dev="sda1" ino=16945 res=1 [ 1475.462210][T18596] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1475.462210][T18596] LLnCq2] [ 1475.489950][T18605] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1475.489950][T18605] i:0%mC0w[:YH [ 1475.489950][T18605] #<^):4<] [ 1475.502290][T18596] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1475.552437][T18596] Error parsing options; rc = [-22] [ 1475.609002][T18605] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1475.609002][T18605] LLnCq2] [ 1475.629987][T18605] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1475.643469][T18605] Error parsing options; rc = [-22] 04:23:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) lseek(0xffffffffffffffff, 0xc8d6, 0x1) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x800}, 0x10) 04:23:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:23:59 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x4}], 0x1, 0x0) 04:23:59 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8/\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:23:59 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7ffff000}], 0x1, 0x0) 04:23:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000001c0)='s', 0xffcf) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x5, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) [ 1483.060480][T18630] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1483.060480][T18630] i:0/mC0w[:YH [ 1483.060480][T18630] #<^):4<] [ 1483.117443][ T27] audit: type=1804 audit(1585887839.691:150): pid=18628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/361/cgroup.controllers" dev="sda1" ino=17105 res=1 04:23:59 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x5}], 0x1, 0x0) [ 1483.179909][T18630] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1483.179909][T18630] LLnCq2] 04:23:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1483.230049][T18638] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1483.230049][T18638] i:0/mC0w[:YH [ 1483.230049][T18638] #<^):4<] [ 1483.242150][T18630] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1483.376948][T18630] Error parsing options; rc = [-22] [ 1483.405817][T18638] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1483.405817][T18638] LLnCq2] 04:24:00 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x6}], 0x1, 0x0) [ 1483.497007][ T27] audit: type=1804 audit(1585887840.071:151): pid=18647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir486772306/syzkaller.JWMfm1/362/cgroup.controllers" dev="sda1" ino=17113 res=1 [ 1483.497966][T18638] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0xfffffffffffffcfd, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b2000067a500"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x2c, 0x2, [@TCA_BASIC_EMATCHES={0x28, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2e23}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_META={0x18, 0x1, 0x0, 0x0, {{}, [@TCA_EM_META_HDR={0xc, 0x1, {{}, {0x7}}}]}}]}]}]}}]}, 0x5c}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r5}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x7, 0x2, 0x4, {r6, r7/1000+10000}, {}, {0x1, 0x1, 0x1}, 0x1, @canfd={{0x3, 0x0, 0x1, 0x1}, 0x4, 0x3, 0x0, 0x0, "f7f5ad07ff34c05b65f766c902efa139efc4b60680c68e9cc4d400649432a28429ce7824642aec2d4c5f23a72e7d4a2e0edf03a339e7be40581fe8b4db4a69d2"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x1) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x22ec03, 0x0) close(r8) ioctl$IOC_PR_RESERVE(r8, 0x401070c9, &(0x7f0000000000)={0x8000, 0xffffffff}) 04:24:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:00 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7}], 0x1, 0x0) [ 1483.766155][T18638] Error parsing options; rc = [-22] 04:24:00 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8:\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) waitid(0x0, r3, &(0x7f00000002c0), 0x1000000, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) 04:24:00 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x8}], 0x1, 0x0) 04:24:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1484.132362][T18680] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1484.132362][T18680] i:0:mC0w[:YH [ 1484.132362][T18680] #<^):4<] [ 1484.265598][T18680] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1484.265598][T18680] LLnCq2] [ 1484.348597][T18680] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1484.408814][T18680] Error parsing options; rc = [-22] 04:24:01 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff8000}], 0x1, 0x0) [ 1485.056148][ T27] audit: type=1800 audit(1585887841.631:152): pid=18698 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17090 res=0 04:24:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000001c0)='s', 0xffcf) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x5, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) 04:24:10 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x9}], 0x1, 0x0) 04:24:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='{'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 04:24:10 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8\\\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:10 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffff000}], 0x1, 0x0) [ 1494.382542][T18708] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1494.382542][T18708] i:0\mC0w[:YH [ 1494.382542][T18708] #<^):4<] [ 1494.448008][T18708] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1494.448008][T18708] LLnCq2] 04:24:11 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xa}], 0x1, 0x0) [ 1494.490151][T18708] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1494.519685][T18723] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1494.519685][T18723] i:0\mC0w[:YH [ 1494.519685][T18723] #<^):4<] [ 1494.564745][T18708] Error parsing options; rc = [-22] [ 1494.575701][T18723] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1494.575701][T18723] LLnCq2] [ 1494.598248][T18723] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:11 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8\xee\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1494.623784][T18723] Error parsing options; rc = [-22] 04:24:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="79d68880cacf0086da7bcf791e9e66fd5cdefc80da00000000ffffffff48f09ddc1fedfba16fdd0cf845ad650638bb1020de22795ac51fdb6336dcc53ac416603bbb4f08ed5776df5ba440"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 04:24:11 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xb}], 0x1, 0x0) [ 1494.758285][T18733] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1494.758285][T18733] i:0mC0w[:YH [ 1494.758285][T18733] #<^):4<] [ 1494.817818][T18733] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1494.817818][T18733] LLnCq2] [ 1494.851942][T18733] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:11 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xc}], 0x1, 0x0) [ 1494.876623][T18741] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1494.876623][T18741] i:0mC0w[:YH [ 1494.876623][T18741] #<^):4<] [ 1494.913332][T18733] Error parsing options; rc = [-22] [ 1494.924146][T18741] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1494.924146][T18741] LLnCq2] [ 1494.945709][T18741] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000000)) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) [ 1494.988820][T18741] Error parsing options; rc = [-22] [ 1495.292316][ T27] audit: type=1800 audit(1585887851.871:153): pid=18718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16849 res=0 04:24:20 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xee\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000001c0)='s', 0xffcf) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x5, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) 04:24:20 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xf}], 0x1, 0x0) 04:24:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:20 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffffdef}], 0x1, 0x0) 04:24:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000080)=0x1e) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) [ 1503.772649][T18766] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1503.772649][T18766] i:0.mC0w[:YH [ 1503.772649][T18766] #<^):4<] 04:24:20 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x10}], 0x1, 0x0) [ 1503.853264][T18766] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1503.853264][T18766] LLnCq2] [ 1503.898104][T18766] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1503.942522][T18781] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1503.942522][T18781] i:0.mC0w[:YH [ 1503.942522][T18781] #<^):4<] [ 1503.957304][T18766] Error parsing options; rc = [-22] [ 1503.967262][T18781] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1503.967262][T18781] LLnCq2] [ 1503.980977][T18781] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1503.994290][T18781] Error parsing options; rc = [-22] 04:24:20 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x02mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:20 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1d}], 0x1, 0x0) 04:24:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ccf9000010f9fffffffb088d5d1a4579"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 1504.219835][T18792] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1504.219835][T18792] i:0.mC0w[:YH [ 1504.219835][T18792] #<^):4<] 04:24:20 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x23}], 0x1, 0x0) [ 1504.289698][T18792] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1504.289698][T18792] LLnCq2] [ 1504.322240][T18794] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1504.322240][T18794] i:0.mC0w[:YH [ 1504.322240][T18794] #<^):4<] [ 1504.355195][T18792] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1504.387584][T18794] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1504.387584][T18794] LLnCq2] [ 1504.407027][T18792] Error parsing options; rc = [-22] [ 1504.414167][T18794] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1504.430354][T18794] Error parsing options; rc = [-22] 04:24:28 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xe0}], 0x1, 0x0) 04:24:28 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x03mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 04:24:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:28 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7ffffffffffff}], 0x1, 0x0) [ 1512.413757][T18823] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1512.413757][T18823] i:0.mC0w[:YH [ 1512.413757][T18823] #<^):4<] 04:24:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:29 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff888128dc5a68}], 0x1, 0x0) 04:24:29 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x300}], 0x1, 0x0) [ 1512.474673][T18823] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1512.474673][T18823] LLnCq2] [ 1512.498089][T18823] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1512.519414][T18823] Error parsing options; rc = [-22] 04:24:29 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x05mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:29 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:24:29 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff888128ddb0a8}], 0x1, 0x0) 04:24:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0x4000000, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) 04:24:29 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x500}], 0x1, 0x0) 04:24:29 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:24:29 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x06mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1513.066527][T18880] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1513.066527][T18880] i:0.mC0w[:YH [ 1513.066527][T18880] #<^):4<] [ 1513.095462][T18883] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1513.095462][T18883] i:0.mC0w[:YH [ 1513.095462][T18883] #<^):4<] [ 1513.116932][T18880] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1513.116932][T18880] LLnCq2] [ 1513.128492][T18883] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1513.128492][T18883] LLnCq2] [ 1513.139986][T18880] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1513.140082][T18883] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1513.153470][T18880] Error parsing options; rc = [-22] [ 1513.169121][T18883] Error parsing options; rc = [-22] [ 1518.693489][ T27] audit: type=1804 audit(1585887875.271:154): pid=18887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/163/cgroup.controllers" dev="sda1" ino=16578 res=1 04:24:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:35 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff888128ddb828}], 0x1, 0x0) 04:24:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000480)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='k\x00', @ANYRES16=r3, @ANYBLOB="ee0d0018012b13dbdf25070000000801804000000000"], 0x3}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000018}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r3, 0x8, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:dhcpd_unit_file_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @rand_addr=0xbd20}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) ioctl$CAPI_NCCI_GETUNIT(r4, 0x80044327, &(0x7f0000000000)=0x7) 04:24:35 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1100}], 0x1, 0x0) 04:24:35 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:24:35 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\amC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1518.895500][T18893] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1518.895500][T18893] i:0.mC0w[:YH [ 1518.895500][T18893] #<^):4<] [ 1518.931728][T18902] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i 04:24:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1518.931728][T18902] i:0.mC0w[:YH [ 1518.931728][T18902] #<^):4<] [ 1518.961101][T18893] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1518.961101][T18893] LLnCq2] [ 1518.974440][T18893] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:35 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffffffffffff000}], 0x1, 0x0) 04:24:35 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1200}], 0x1, 0x0) [ 1519.000154][T18893] Error parsing options; rc = [-22] [ 1519.005435][T18902] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1519.005435][T18902] LLnCq2] [ 1519.022640][T18902] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1519.081706][T18902] Error parsing options; rc = [-22] 04:24:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:35 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffffffffffffdef}], 0x1, 0x0) 04:24:35 executing program 2: clone(0x200230249fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="792e74332c1172f2f1ce5c4f54c8f9efa7e5be"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0xc0281, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) write$evdev(r2, &(0x7f00000004c0)=[{{0x77359400}, 0x11, 0x1, 0x1ff}, {{}, 0x4, 0x400, 0x2}, {{0x77359400}, 0x1f, 0x8, 0x400}, {{}, 0x15, 0x8, 0x9}, {{0x0, 0x7530}, 0x12, 0x3, 0x5}, {{}, 0x1f, 0xce6, 0x400}, {{r3, r4/1000+30000}, 0x3, 0x7fff, 0x5}, {{}, 0x15, 0x8001, 0x80}, {{0x77359400}, 0x11, 0x339, 0xfffffffb}], 0xd8) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e21, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendto$l2tp(r0, &(0x7f0000000100), 0x0, 0x90, &(0x7f0000000180)={0x2, 0x0, @local, 0x3}, 0x10) fallocate(r1, 0x5, 0x47e1, 0x8020003) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000280)={0x9b0000, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x9c0903, 0x9, [], @string=&(0x7f0000000200)=0x6}}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f00000002c0)={0x4, [0x1, 0x3e0, 0x3, 0x9]}, 0xc) open(&(0x7f0000000080)='./bus\x00', 0x20802, 0xc0) [ 1525.192209][ T27] audit: type=1804 audit(1585887881.771:155): pid=18943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/164/cgroup.controllers" dev="sda1" ino=16913 res=1 04:24:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:41 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\bmC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1300}], 0x1, 0x0) 04:24:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x2, 0x0) 04:24:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2101, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0x9, 0xb05, 0x1, 0x3, 0x6, 0x3, 0x9, 0x5, 0xb7b20000, 0xcf, 0x9, 0x91, 0x3ff, 0x26, 0x1, 0x15, {0x400, 0x7}, 0x6, 0x1}}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socket$tipc(0x1e, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) [ 1525.342128][T18949] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1525.342128][T18949] i:0.mC0w[:YH [ 1525.342128][T18949] #<^):4<] [ 1525.367466][T18957] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1525.367466][T18957] i:0.mC0w[:YH [ 1525.367466][T18957] #<^):4<] 04:24:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1525.388773][T18949] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1525.388773][T18949] LLnCq2] 04:24:42 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x3, 0x0) [ 1525.438858][T18957] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1525.438858][T18957] LLnCq2] [ 1525.446237][T18949] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:42 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1400}], 0x1, 0x0) [ 1525.486637][T18957] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:24:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1525.528771][T18957] Error parsing options; rc = [-22] [ 1525.556761][T18949] Error parsing options; rc = [-22] 04:24:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='{'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 04:24:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1533.651956][ T27] audit: type=1804 audit(1585887890.231:156): pid=18993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/165/cgroup.controllers" dev="sda1" ino=16961 res=1 04:24:51 executing program 4: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='cgroup.controllers\x00', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x80}, 0x8024, 0x61, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) gettid() openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x111201, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) syz_open_procfs(r0, 0x0) perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) 04:24:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1500}], 0x1, 0x0) 04:24:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\nmC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x4, 0x0) 04:24:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000001800128008000100736974000c00028008000200", @ANYRES32=r2, @ANYBLOB="403086a2"], 0x38}}, 0x0) 04:24:51 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="005042488c23492881ad93efde8b98bd459e7e3a44"], 0x48}}, 0x0) r4 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r5, 0x75}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 1534.742159][T19002] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1534.742159][T19002] i:0. [ 1534.742159][T19002] mC0w[:YH [ 1534.742159][T19002] #<^):4<] [ 1534.778047][T19002] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1534.778047][T19002] LLnCq2] 04:24:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:24:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x5, 0x0) 04:24:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x4000}], 0x1, 0x0) [ 1534.822409][T19002] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1534.866181][T19002] Error parsing options; rc = [-22] 04:24:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x10mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:24:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1535.096948][T19031] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1535.096948][T19031] i:0.mC0w[:YH [ 1535.096948][T19031] #<^):4<] [ 1535.133304][T19031] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1535.133304][T19031] LLnCq2] [ 1535.146722][T19031] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1535.181776][T19031] Error parsing options; rc = [-22] 04:25:00 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x6, 0x0) 04:25:00 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x4100}], 0x1, 0x0) 04:25:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x3}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) r6 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r6, &(0x7f0000000000), 0x4000000000001f2, 0x0) 04:25:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:00 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x12mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000480)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='k\x00', @ANYRES16=r5, @ANYBLOB="ee0d0018012b13dbdf25070000000801804000000000"], 0x3}}, 0x20000000) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x88, r5, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x7fffffff}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x9}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bond\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr="e85e9d6cb062814674ca70fa0d085671"}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gre0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}]}, 0x88}, 0x1, 0x0, 0x0, 0x4004}, 0x20000140) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000000)="0f22270fc76ca7baa00066ed66b91e0100000f320f20d8b135200000000f20d80f22d8f30fbcf80f3581d90c0066f2ba5f57160fc77c01", 0x37}], 0x17, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, @can, @tipc, @rc={0x1f, @none, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='dummy0\x00'}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000005000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000001c0)="9a15035c8eea0066baf80cb8e8d9a481ef66bafc0cb800800000ef0f78a100200000a50fc72b66ba200066ed640f01cac4c285408b0e000000f30f01dfc7442400f2230000c7442402c7800000c7442406000000000f011424", 0x59}], 0x1, 0x32, &(0x7f0000000240)=[@efer={0x2, 0x1000}, @cr4={0x1, 0x50}], 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:25:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000036c0), 0x12) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x5, 0x5) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x7ff, 0x0, 0x0, 0x3, 0x1, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="5700000081a3a51b1c30e8f6cb2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd2b99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"], &(0x7f0000000440)=0x5f) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x6, 0x0, 0xb5}, 0x10) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[]}, 0x1, 0x0, 0x0, 0x880}, 0x0) 04:25:00 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7:mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:00 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x8100}], 0x1, 0x0) 04:25:00 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7, 0x0) [ 1544.363499][T19067] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1544.363499][T19067] i:0.:mC0w[:YH [ 1544.363499][T19067] #<^):4<] 04:25:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1544.413773][T19067] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1544.413773][T19067] LLnCq2] [ 1544.456945][T19067] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:01 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x8, 0x0) [ 1544.502569][T19067] Error parsing options; rc = [-22] 04:25:01 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\xeemC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:01 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}}) dup3(r3, r2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0xfde5c46e54147338, @empty, 0x4e24, 0x1, 'wlc\x00', 0x2, 0x8001, 0x21}, 0x2c) 04:25:01 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xf000}], 0x1, 0x0) [ 1544.678940][T19095] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1544.678940][T19095] i:0.mC0w[:YH [ 1544.678940][T19095] #<^):4<] 04:25:01 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x9, 0x0) 04:25:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1544.727593][T19095] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1544.727593][T19095] LLnCq2] [ 1544.754292][T19095] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1544.771948][T19103] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1544.771948][T19103] i:0.mC0w[:YH [ 1544.771948][T19103] #<^):4<] [ 1544.806233][T19095] Error parsing options; rc = [-22] [ 1544.899073][T19103] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1544.899073][T19103] LLnCq2] [ 1544.943685][T19103] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1544.958077][T19103] Error parsing options; rc = [-22] 04:25:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000200)={0x9, 0xfffffffffffffda6, 0xfa00, {r2, 0x20, '\x00', "0bacd5e4daeb13709539210382712d1bceec96860d8c8ac172fde4b44bc1928854c4f289561270b03f7bde1dc0e85786ea6b57720000000000000002399f53b841255b5101583d637a82063ca3eeb38d1c4d41c71ad866e6017d34fad0a3fb83bb9a47d1c7efc17b3578f516267bcac5ba1cc14c2370bcb63e20ed5eb72f8818f67c54f647f027bf89f683c79db197c0ef74775131c053530a9cd182ae1eafeb90e5c82329f7c147467a9e30c20aaad30d187bc2cac193438f176c82fd02d86891de7a660827007df52c45f4d53d0ba41bcee6a10a0f87c474fc8a438b5333e6e040804a906114c920dbe0564c7a76ef796c8f25446a8d8b3e8527cfd246db69"}}, 0x110) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='udf\x00', 0x0, &(0x7f0000000380)='system^.@[vboxnet1*(\x00') 04:25:08 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfdef}], 0x1, 0x0) 04:25:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xa, 0x0) 04:25:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04\nC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:08 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@setlink={0x130, 0x13, 0x200, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, 0x500, 0xd860}, [@IFLA_PHYS_SWITCH_ID={0x15, 0x24, "1e6a8c98d247a187ea4068a1bcc641e4d7"}, @IFLA_VFINFO_LIST={0xe4, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x4, 0x9}}]}, {0xd0, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x2c, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x200, 0x2dc, 0xaf, 0x88a8}}, {0x14, 0x1, {0x8, 0x4f8, 0x8, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x9, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0xffff, 0x2}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x800, 0x648, 0x3f, 0x88a8}}]}, @IFLA_VF_RATE={0x10, 0x6, {0x4d, 0x9, 0x8}}, @IFLA_VF_VLAN={0x10, 0x2, {0x0, 0xd62, 0xfef0}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x4, 0x1}}, @IFLA_VF_MAC={0x28, 0x1, {0x0, @random="6f088634620a"}}, @IFLA_VF_RATE={0x10, 0x6, {0xf, 0x6, 0xa31}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x8, 0xffffffff}}]}]}, @IFLA_ADDRESS={0xa, 0x1, @multicast}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x2}]}, 0x130}}, 0x0) 04:25:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@mpls_delroute={0x54, 0x19, 0x200, 0x70bd2d, 0x25dfdbfd, {0x1c, 0x20, 0x14, 0x81, 0x0, 0x2, 0x0, 0x6, 0x3400}, [@RTA_VIA={0x14, 0x12, {0x4, "7c839f67d485578847b430ff5a9c"}}, @RTA_DST={0x8, 0x1, {0x100}}, @RTA_VIA={0x14, 0x12, {0xf, "cbcb3b6d62bf7567f433741bd311"}}, @RTA_OIF={0x8, 0x4, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000090}, 0x0) [ 1551.516525][T19129] UDF-fs: bad mount option "system^.@[vboxnet1*(" or missing value [ 1551.520052][T19132] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1551.520052][T19132] i:0. [ 1551.520052][T19132] C0w[:YH [ 1551.520052][T19132] #<^):4<] 04:25:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xb, 0x0) 04:25:08 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffe0}], 0x1, 0x0) 04:25:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04%C0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1551.640155][T19132] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1551.640155][T19132] LLnCq2] [ 1551.652387][T19132] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1551.666179][T19132] Error parsing options; rc = [-22] 04:25:08 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x1) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000100)={0xc8, 0x0, 0x7, 0x5, 0x0, 0x6, 0x7}, 0xc) io_setup(0x5f, &(0x7f00000000c0)=0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0x1, 0x2, 0xd66, 0x1, 0x2}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@loopback, @ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20c20082}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x70806, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x3001}) io_submit(r1, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000040), 0x65}]) socket$netlink(0x10, 0x3, 0x10) [ 1551.786250][T19155] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1551.786250][T19155] i:0.%C0w[:YH [ 1551.786250][T19155] #<^):4<] 04:25:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xc, 0x0) [ 1551.833159][T19158] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1551.833159][T19158] i:0.%C0w[:YH [ 1551.833159][T19158] #<^):4<] [ 1551.856819][T19155] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1551.856819][T19155] LLnCq2] 04:25:08 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x20003041}], 0x1, 0x0) [ 1551.912589][T19158] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1551.912589][T19158] LLnCq2] [ 1551.931736][T19155] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xf, 0x0) [ 1551.967091][T19158] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1551.987340][T19155] Error parsing options; rc = [-22] [ 1551.999490][T19158] Error parsing options; rc = [-22] 04:25:08 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4000000010003b04a72a1c441afc93787fcb2703d31c24fa44ea7755c2700cddc6f14a77e8a309430de8b4f0d5ea505a29c6c238ba06f5c695826e68ebd7f84959866fdf5fd0c51f90bcdc609813b6b7cabe8443c56b50032ad0397408d975", @ANYRES32, @ANYBLOB="eb000000000000002000120008000100736974001400020008001400080000000800ef04", @ANYRES32], 0x40}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000040)={0x0, r3}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 1552.145983][T19173] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1552.207130][T19176] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 04:25:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04\xeeC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1552.386772][T19182] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1552.386772][T19182] i:0.C0w[:YH [ 1552.386772][T19182] #<^):4<] [ 1552.387557][T19184] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1552.387557][T19184] i:0.C0w[:YH [ 1552.387557][T19184] #<^):4<] [ 1552.433357][T19184] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1552.433357][T19184] LLnCq2] [ 1552.445850][T19184] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1552.461569][T19184] Error parsing options; rc = [-22] [ 1552.466978][T19182] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1552.466978][T19182] LLnCq2] [ 1552.481230][T19182] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1552.537465][T19182] Error parsing options; rc = [-22] [ 1552.823221][ T27] audit: type=1800 audit(1585887909.401:157): pid=19192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17162 res=0 04:25:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_to_bond\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="700100002400ffffff070000ddff000000009300", @ANYRES32=r1, @ANYBLOB="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"/954], 0x170}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x3, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getrusage(0x0, &(0x7f0000000680)) 04:25:13 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x10, 0x0) 04:25:13 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04m\t0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7ffff000}], 0x1, 0x0) 04:25:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x80c00, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x3a3002, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) ioctl$TIOCGPTPEER(r2, 0x5441, 0x5) close(r1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000180)={{0x3, 0x0, @descriptor="2164755536b194fb"}}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$SNDRV_PCM_IOCTL_DELAY(r3, 0x80084121, &(0x7f0000000040)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'macvtap0\x00', 0x100}) [ 1556.680224][T19200] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1556.680224][T19200] i:0.m 0w[:YH [ 1556.680224][T19200] #<^):4<] [ 1556.686470][T19204] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. 04:25:13 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f0000000040)={0x80007}) [ 1556.750611][T19208] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1556.768091][T19200] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1556.768091][T19200] LLnCq2] [ 1556.823858][T19200] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:13 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x23, 0x0) [ 1556.867717][T19213] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1556.867717][T19213] i:0.m 0w[:YH [ 1556.867717][T19213] #<^):4<] [ 1556.872904][T19216] EXT4-fs warning (device sda1): ext4_resize_begin:45: There are errors in the filesystem, so online resizing is not allowed [ 1556.902377][T19200] Error parsing options; rc = [-22] [ 1556.903244][T19213] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY 04:25:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x14}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x7c}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000080)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) [ 1556.903244][T19213] LLnCq2] [ 1556.919546][T19213] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1556.932825][T19213] Error parsing options; rc = [-22] 04:25:13 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04m\n0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:13 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x46, 0x0) 04:25:13 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x242}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e26, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000340)={0x0, 0xfff, 0x0, {0x0, 0x80}}) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000001c40)={&(0x7f0000001c00), 0x1310000, 0x800, 0x5}, 0x20) [ 1557.181404][T19230] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1557.181404][T19230] i:0.m [ 1557.181404][T19230] 0w[:YH [ 1557.181404][T19230] #<^):4<] [ 1557.288996][T19230] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1557.288996][T19230] LLnCq2] [ 1557.329335][T19230] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:13 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x300, 0x0) [ 1557.372346][T19239] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1557.372346][T19239] i:0.m [ 1557.372346][T19239] 0w[:YH [ 1557.372346][T19239] #<^):4<] 04:25:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1557.465993][T19230] Error parsing options; rc = [-22] [ 1557.493670][T19239] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1557.493670][T19239] LLnCq2] [ 1557.551282][T19239] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:14 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x500, 0x0) [ 1557.615666][T19239] Error parsing options; rc = [-22] [ 1557.869368][ T27] audit: type=1800 audit(1585887914.451:158): pid=19237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17189 res=0 04:25:14 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff8000}], 0x1, 0x0) 04:25:14 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04m%0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1558.126469][T19264] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1558.126469][T19264] i:0.m%0w[:YH [ 1558.126469][T19264] #<^):4<] [ 1558.175893][T19264] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1558.175893][T19264] LLnCq2] [ 1558.191189][T19264] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1558.213255][T19266] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1558.213255][T19266] i:0.m%0w[:YH [ 1558.213255][T19266] #<^):4<] [ 1558.226434][T19264] Error parsing options; rc = [-22] [ 1558.237523][T19266] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1558.237523][T19266] LLnCq2] [ 1558.254891][T19266] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1558.268228][T19266] Error parsing options; rc = [-22] [ 1558.658521][ T27] audit: type=1800 audit(1585887915.231:159): pid=19269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17182 res=0 04:25:21 executing program 2: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x12) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000240)='memory.events\x00'}, 0x30) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000015980)={&(0x7f0000014580)=@xdp, 0x80, &(0x7f0000014900)=[{0x0}], 0x1, &(0x7f0000014980)=""/4096, 0x1000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x4}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000380)={0xfc80c9dcbc7ebf3f, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000b, 0x0, 0x0, 0x6, 0x0, 0xbb}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480), 0x4) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff051805001201", 0x2e}], 0x1}, 0x0) 04:25:21 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1100, 0x0) 04:25:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:21 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04m]0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0300630000000100004a0000000480000007a60000000000000000000500000000004200000000000000000000048000000000000000000000000000000055aa", 0x40, 0x1c0}]) 04:25:21 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffff000}], 0x1, 0x0) [ 1565.193541][T19281] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1565.229831][T19287] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i 04:25:21 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1700, 0x0) [ 1565.229831][T19287] i:0.m]0w[:YH [ 1565.229831][T19287] #<^):4<] [ 1565.279816][T19281] bridge0: port 2(bridge_slave_1) entered disabled state [ 1565.287032][T19281] bridge0: port 1(bridge_slave_0) entered disabled state [ 1565.292414][T19287] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1565.292414][T19287] LLnCq2] [ 1565.336361][T19281] device bridge0 entered promiscuous mode [ 1565.354915][T19296] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1565.354915][T19296] i:0.m]0w[:YH [ 1565.354915][T19296] #<^):4<] [ 1565.413140][T19287] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1565.438158][T19301] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1565.451168][T19301] bridge0: port 2(bridge_slave_1) entered blocking state [ 1565.458298][T19301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1565.465621][T19301] bridge0: port 1(bridge_slave_0) entered blocking state [ 1565.472673][T19301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1565.492933][T19296] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1565.492933][T19296] LLnCq2] 04:25:22 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x4000, 0x0) [ 1565.525160][T19287] Error parsing options; rc = [-22] [ 1565.537614][T19296] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1565.595393][T19296] Error parsing options; rc = [-22] 04:25:22 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04m\xee0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:22 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x4100, 0x0) 04:25:22 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/vmstat\x00', 0x0, 0x0) read(r0, &(0x7f0000000280)=""/152, 0x20000318) [ 1565.868856][T19317] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1565.868856][T19317] i:0.m0w[:YH [ 1565.868856][T19317] #<^):4<] 04:25:22 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7100, 0x0) 04:25:22 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x800000003, 0xff) r1 = eventfd2(0x3ff, 0x0) write$eventfd(r1, &(0x7f00000000c0)=0xfffffffffffffffa, 0x8) r2 = eventfd2(0x78, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000100)=""/69, 0x45}, {0x0}, {0x0}], 0x3, 0x7) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffb, 0x8) dup2(r1, r2) r3 = dup(r0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141142, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 1565.957470][T19317] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1565.957470][T19317] LLnCq2] [ 1565.999760][T19317] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1566.061811][T19317] Error parsing options; rc = [-22] 04:25:22 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC\nw\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:22 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffffdef}], 0x1, 0x0) [ 1567.032462][ T27] audit: type=1800 audit(1585887923.611:160): pid=19343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16721 res=0 [ 1573.559103][T19357] ldm_validate_privheads(): Disk read failed. [ 1573.565285][T19357] loop4: p1 p2 p3 [ 1573.569388][T19357] loop4: partition table partially beyond EOD, truncated [ 1573.576503][T19357] loop4: p1 start 1241513985 is beyond EOD, truncated [ 1573.583360][T19357] loop4: p2 size 327680 extends beyond EOD, truncated [ 1573.590782][T19357] loop4: p3 size 67108864 extends beyond EOD, truncated 04:25:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/cpuinfo\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() read(r0, &(0x7f0000000280)=""/152, 0x20000318) 04:25:30 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7200, 0x0) 04:25:30 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC#w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:25:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0xc080aebe, &(0x7f0000000580)={"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"}) 04:25:30 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffffffe0}], 0x1, 0x0) [ 1573.754394][T19366] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1573.754394][T19366] i:0.mC#w[:YH [ 1573.754394][T19366] #<^):4<] [ 1573.788835][T19366] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1573.788835][T19366] LLnCq2] [ 1573.815703][T19366] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:30 executing program 2: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f\\f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9']) [ 1573.867104][T19383] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1573.867104][T19383] i:0.mC#w[:YH [ 1573.867104][T19383] #<^):4<] [ 1573.871149][T19366] Error parsing options; rc = [-22] 04:25:30 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7300, 0x0) 04:25:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) [ 1573.998803][T19383] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1573.998803][T19383] LLnCq2] [ 1574.031359][T19383] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:30 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) [ 1574.058783][T19383] Error parsing options; rc = [-22] 04:25:30 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7400, 0x0) [ 1574.148365][ T27] audit: type=1804 audit(1585887930.721:161): pid=19404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir616668279/syzkaller.oBNzR5/395/bus" dev="sda1" ino=16986 res=1 04:25:30 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC%w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1574.235611][ T27] audit: type=1804 audit(1585887930.761:162): pid=19404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir616668279/syzkaller.oBNzR5/395/bus" dev="sda1" ino=16986 res=1 [ 1574.314784][ T27] audit: type=1804 audit(1585887930.761:163): pid=19404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir616668279/syzkaller.oBNzR5/395/bus" dev="sda1" ino=16986 res=1 [ 1574.406476][T19414] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1574.406476][T19414] i:0.mC%w[:YH [ 1574.406476][T19414] #<^):4<] [ 1574.438791][T19414] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1574.438791][T19414] LLnCq2] [ 1574.476717][T19414] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1574.516676][T19415] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1574.516676][T19415] i:0.mC%w[:YH [ 1574.516676][T19415] #<^):4<] [ 1574.538557][T19414] Error parsing options; rc = [-22] [ 1574.578893][T19415] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1574.578893][T19415] LLnCq2] [ 1574.597267][T19415] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1574.632103][T19415] Error parsing options; rc = [-22] 04:25:38 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7500, 0x0) 04:25:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2, 0x1}}, 0x18) 04:25:38 executing program 2: 04:25:38 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC+w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/cpuinfo\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() read(r0, &(0x7f0000000280)=""/152, 0x20000318) 04:25:38 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x7ffffffffffff}], 0x1, 0x0) 04:25:38 executing program 2: [ 1582.306420][T19437] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1582.306420][T19437] i:0.mC+w[:YH [ 1582.306420][T19437] #<^):4<] 04:25:38 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x8100, 0x0) 04:25:39 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff888128dc4028}], 0x1, 0x0) [ 1582.404664][T19437] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1582.404664][T19437] LLnCq2] 04:25:39 executing program 2: 04:25:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1582.452462][T19437] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1582.521733][T19437] Error parsing options; rc = [-22] 04:25:39 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff888128dc47a8}], 0x1, 0x0) 04:25:39 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xf000, 0x0) 04:25:39 executing program 2: 04:25:39 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC-w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:39 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfdef, 0x0) [ 1582.785503][T19476] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1582.785503][T19476] i:0.mC-w[:YH [ 1582.785503][T19476] #<^):4<] [ 1582.839278][T19476] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1582.839278][T19476] LLnCq2] [ 1582.853849][T19476] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1582.868975][T19481] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1582.868975][T19481] i:0.mC-w[:YH [ 1582.868975][T19481] #<^):4<] [ 1582.914755][T19481] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1582.914755][T19481] LLnCq2] [ 1582.943137][T19476] Error parsing options; rc = [-22] [ 1582.948518][T19481] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1582.961763][T19481] Error parsing options; rc = [-22] 04:25:45 executing program 4: 04:25:45 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff888128dc4f28}], 0x1, 0x0) 04:25:45 executing program 2: 04:25:45 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC/w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:45 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x20003041, 0x0) 04:25:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:45 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffffffffffff000}], 0x1, 0x0) 04:25:45 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7ffff000, 0x0) [ 1588.751125][T19498] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1588.751125][T19498] i:0.mC/w[:YH [ 1588.751125][T19498] #<^):4<] 04:25:45 executing program 2: [ 1588.822759][T19506] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1588.822759][T19506] i:0.mC/w[:YH [ 1588.822759][T19506] #<^):4<] 04:25:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x0, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1588.879233][T19498] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1588.879233][T19498] LLnCq2] [ 1588.898190][T19506] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1588.898190][T19506] LLnCq2] 04:25:45 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xfffffffffffffdef}], 0x1, 0x0) 04:25:45 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff8000, 0x0) [ 1588.918952][T19498] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1588.928865][T19506] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:45 executing program 2: [ 1589.028756][T19506] Error parsing options; rc = [-22] [ 1589.037690][T19498] Error parsing options; rc = [-22] 04:25:51 executing program 4: 04:25:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffff000, 0x0) 04:25:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffffffffffffffe0}], 0x1, 0x0) 04:25:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC:w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:51 executing program 2: 04:25:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1595.045930][T19544] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1595.045930][T19544] i:0.mC:w[:YH [ 1595.045930][T19544] #<^):4<] 04:25:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x2, 0x0) 04:25:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffffdef, 0x0) 04:25:51 executing program 2: [ 1595.104649][T19544] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1595.104649][T19544] LLnCq2] [ 1595.117309][T19544] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x3, 0x0) 04:25:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7ffffffffffff, 0x0) [ 1595.282502][T19544] Error parsing options; rc = [-22] 04:25:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x60d18ea6889c169d}}, 0x50) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6f09125e6fe025dbb9fee805ec3fbd01a565044c4dfcad3f6cd8ed1890259c4e3a5c4df1dac768c140b77fe3b03b9da347dee64ab0ce1345e80aa1754b3b6f66a42caabfb93802b5fa90ca0907f71d6e09ac618183f635ea25bd4018ec8360191d8bc05b8cc5779197e64915c0b411bd782f4e312a1a8002d29451dde2b150401e4e9e79fd6d3c38b4412a7a21ede93defaed04bde687faa83fc8a1330e756ceb2550c98b929f1ef49fc7cbb87bdb1d9d9604542cc9c74395d61e1b099c12eaeebb9051efc33c4a6901d", @ANYRES16=0x0, @ANYBLOB="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"], 0x220}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4803, 0x0) 04:25:55 executing program 2: 04:25:55 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC\\w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:25:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:55 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x4, 0x0) 04:25:55 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff888128dc5a68, 0x0) 04:25:55 executing program 2: sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c6622c8a96922a204ee203e6da3b68df77529c906a0a4709792184f07f433b1b56feb51373840aced23fe6eb8", @ANYRES16=0x0, @ANYBLOB="04002bbd7000fbdbdf2501000000000000000241"], 0x3}}, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000200)) [ 1599.278342][T19585] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1599.278342][T19585] i:0.mC\w[:YH [ 1599.278342][T19585] #<^):4<] 04:25:55 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff888128ddb0a8, 0x0) 04:25:55 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x5, 0x0) [ 1599.366274][T19592] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1599.366274][T19592] i:0.mC\w[:YH [ 1599.366274][T19592] #<^):4<] [ 1599.413121][T19585] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1599.413121][T19585] LLnCq2] 04:25:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x100000001, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/68, 0x44}], 0x1, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0xfffffff9) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/68, 0x44}], 0x1, 0x0) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)="2ae20843e9f09167d08fd3c77f7af7f0bfc2038be43cb58aea26d963acc51a4e2f55eb677f0e5b37575f42a3fe370e85243df2323279c1870bbe7d004e4ce602ac8b316d0e4cfe24711bf37c9115d182f332d4617fa3e43261ebbad2d6d768a0fcf82428a4faeddb9774fb1e530e5522dbf418dade96c3342aa069d4efe1cf0c44cfa2b67a2156eb9eb2c9ad48e80c2a9603d61423decbdf8692b2d32e7f47558294058f8e321d31705b9ff0403e972b0793c3b73c326ee7f75d", 0xba}, {&(0x7f0000000200)="2ab4fb94cf5a3dd56a15ed8c1b488f4de79a987ce6fa790fdb6b3931dfa73a5244d81392e7579a2aa69c9f2b338576a76a9594abd2138e248fd06bf4ec240bb9b661b50dea57ddfcabc42e74d07edded1f823c1e291f93f792019970cbf0b2c4407cd59603a6c148b9cc8ad80ea16dec008f8ac831a2ee442ab61ade", 0x7c}, {&(0x7f0000000280)="4cdcf9776af5f19f5d80eef1413ddb7c377ed126f44faeefcfc606ec7bc9b011d7285ba076f1ebe1afb070d05f64475508677e79c4ee40a218b88b4cc2a3d809064ede6edbb37216ce0ac125394c5c80eaaeba31bcd57cbc6219793e1ee54f9858b48bd6d008b9beb56c76279b5eec42c4474f65eb4824033512d00983c380e9c8629374f9bc66f6dfc0c7f01ea55a2dfa1cf2a8867b9dce820369233c30f4108b3d8445a2a6c858f5e04e9000487252e0d87cb1c1d32b6c9b28719d1ccc47832f5c5afaf52ec3b2d19da724dcc9577993384ba18f327386b67faaaf", 0xdc}], 0x3, 0x9135bbe11d06f345) [ 1599.456875][T19592] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1599.456875][T19592] LLnCq2] [ 1599.458802][T19585] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:25:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:25:56 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x6, 0x0) [ 1599.513720][T19592] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1599.608777][T19585] Error parsing options; rc = [-22] [ 1599.623285][T19592] Error parsing options; rc = [-22] 04:26:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000100) getpid() sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x6, 0x4d0200) lseek(r0, 0x0, 0x3) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000100)=ANY=[@ANYBLOB]) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 04:26:02 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff888128ddb828, 0x0) 04:26:02 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC\xeew\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:02 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7, 0x0) 04:26:02 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000500)='f', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x3a, 0x1, &(0x7f0000000040), 0x4) 04:26:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1605.759011][T19634] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1605.759011][T19634] i:0.mCw[:YH [ 1605.759011][T19634] #<^):4<] 04:26:02 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x8, 0x0) 04:26:02 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffffffffffff000, 0x0) [ 1605.826896][T19634] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1605.826896][T19634] LLnCq2] [ 1605.858201][T19634] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1605.878868][T19634] Error parsing options; rc = [-22] 04:26:02 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0\n\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:02 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x9, 0x0) 04:26:02 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffffffffffffdef, 0x0) [ 1606.060067][T19658] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1606.060067][T19658] i:0.mC0 [ 1606.060067][T19658] [:YH [ 1606.060067][T19658] #<^):4<] [ 1606.121858][T19658] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1606.121858][T19658] LLnCq2] [ 1606.182780][T19658] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1606.207583][T19658] Error parsing options; rc = [-22] 04:26:11 executing program 4: 04:26:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:11 executing program 2: 04:26:11 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x2) 04:26:11 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xa, 0x0) 04:26:11 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0\xee\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:12 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3) [ 1615.400505][T19684] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1615.400505][T19684] i:0.mC0[:YH [ 1615.400505][T19684] #<^):4<] 04:26:12 executing program 2: 04:26:12 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xb, 0x0) [ 1615.458830][T19684] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1615.458830][T19684] LLnCq2] [ 1615.488376][T19684] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1615.562587][T19684] Error parsing options; rc = [-22] 04:26:12 executing program 2: 04:26:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:12 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\xee[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1615.782441][T19712] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1615.782441][T19712] i:0.mC0w[:YH [ 1615.782441][T19712] #<^):4<] [ 1615.821319][T19716] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1615.821319][T19716] i:0.mC0w[:YH [ 1615.821319][T19716] #<^):4<] [ 1615.827120][T19712] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1615.827120][T19712] LLnCq2] [ 1615.847459][T19716] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1615.847459][T19716] LLnCq2] [ 1615.855690][T19712] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1615.868907][T19716] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1615.894239][T19716] Error parsing options; rc = [-22] [ 1615.899664][T19712] Error parsing options; rc = [-22] 04:26:18 executing program 4: 04:26:18 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xc, 0x0) 04:26:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:18 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88\n:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:18 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4) 04:26:18 executing program 2: [ 1621.771720][T19731] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1621.771720][T19731] i:0.mC0w [ 1621.771720][T19731] :YH [ 1621.771720][T19731] #<^):4<] [ 1621.802879][T19736] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1621.802879][T19736] i:0.mC0w 04:26:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100008, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x2, 0x5cb8}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xef02, &(0x7f0000000080)=[{&(0x7f0000000380)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d570000020200bf050005001201", 0x2e}], 0x2}, 0x0) [ 1621.802879][T19736] :YH [ 1621.802879][T19736] #<^):4<] [ 1621.838787][T19731] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1621.838787][T19731] LLnCq2] [ 1621.860897][T19736] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1621.860897][T19736] LLnCq2] 04:26:18 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xf, 0x0) 04:26:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:18 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x5) [ 1621.892053][T19741] device batadv0 entered promiscuous mode [ 1621.901618][T19736] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1621.971302][T19736] Error parsing options; rc = [-22] [ 1621.998497][T19731] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:26:18 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88%:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1622.042115][T19742] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1622.046564][T19731] Error parsing options; rc = [-22] [ 1622.066388][T19742] 8021q: adding VLAN 0 to HW filter on device batadv0 04:26:18 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x6) [ 1622.212221][T19758] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1622.212221][T19758] i:0.mC0w%:YH [ 1622.212221][T19758] #<^):4<] [ 1622.237768][T19762] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1622.237768][T19762] i:0.mC0w%:YH [ 1622.237768][T19762] #<^):4<] [ 1622.259148][T19758] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1622.259148][T19758] LLnCq2] [ 1622.273578][T19762] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1622.273578][T19762] LLnCq2] [ 1622.292543][T19758] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1622.307960][T19762] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1622.326785][T19758] Error parsing options; rc = [-22] [ 1622.332522][T19762] Error parsing options; rc = [-22] 04:26:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10024, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:26:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x10, 0x0) 04:26:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100008, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x2, 0x5cb8}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xef02, &(0x7f0000000080)=[{&(0x7f0000000380)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d570000020200bf050005001201", 0x2e}], 0x2}, 0x0) 04:26:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88\xee:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8) [ 1627.996029][T19779] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1627.996029][T19779] i:0.mC0w:YH [ 1627.996029][T19779] #<^):4<] [ 1628.021760][T19778] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1628.033125][T19778] 8021q: adding VLAN 0 to HW filter on device batadv0 04:26:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1d, 0x0) [ 1628.040369][T19779] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1628.040369][T19779] LLnCq2] [ 1628.075887][T19779] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:26:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x9) 04:26:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup3(r1, r2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x28, &(0x7f0000000000), 0x20a154cc) [ 1628.123015][T19788] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1628.123015][T19788] i:0.mC0w:YH [ 1628.123015][T19788] #<^):4<] [ 1628.218791][T19779] Error parsing options; rc = [-22] [ 1628.220819][T19788] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1628.220819][T19788] LLnCq2] 04:26:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x23, 0x0) 04:26:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc) [ 1628.300944][T19788] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1628.327022][T19788] Error parsing options; rc = [-22] 04:26:29 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x02Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:29 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd) 04:26:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f00000000c0), 0x0) setsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000000), 0x4) 04:26:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:29 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000000)={0x2}) 04:26:29 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xe0, 0x0) 04:26:29 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x10) [ 1633.082230][T19828] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1633.082230][T19828] i:0.mC0w[YH [ 1633.082230][T19828] #<^):4<] 04:26:29 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x300, 0x0) 04:26:29 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 1633.153469][T19828] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1633.153469][T19828] LLnCq2] [ 1633.222453][T19828] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:26:29 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x03Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1633.263213][T19828] Error parsing options; rc = [-22] 04:26:29 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x500, 0x0) 04:26:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:29 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x12) [ 1633.372916][T19851] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1633.372916][T19851] i:0.mC0w[YH [ 1633.372916][T19851] #<^):4<] [ 1633.508845][T19851] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1633.508845][T19851] LLnCq2] [ 1633.537447][T19851] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1633.561152][T19851] Error parsing options; rc = [-22] 04:26:35 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x04Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:35 executing program 4: 04:26:35 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1100, 0x0) 04:26:35 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x18) 04:26:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:35 executing program 2: 04:26:36 executing program 2: [ 1639.446307][T19884] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1639.446307][T19884] i:0.mC0w[YH [ 1639.446307][T19884] #<^):4<] 04:26:36 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x73) 04:26:36 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1200, 0x0) [ 1639.522337][T19884] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1639.522337][T19884] LLnCq2] 04:26:36 executing program 2: [ 1639.594581][T19884] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:26:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a0") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1639.662241][T19884] Error parsing options; rc = [-22] 04:26:36 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x75) 04:26:36 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x05Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1639.877541][T19917] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1639.877541][T19917] i:0.mC0w[YH [ 1639.877541][T19917] #<^):4<] [ 1639.901577][T19919] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1639.901577][T19919] i:0.mC0w[YH [ 1639.901577][T19919] #<^):4<] [ 1639.928084][T19917] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1639.928084][T19917] LLnCq2] [ 1639.944584][T19919] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1639.944584][T19919] LLnCq2] [ 1639.951238][T19917] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1639.956862][T19919] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1639.973396][T19917] Error parsing options; rc = [-22] [ 1640.018845][T19919] Error parsing options; rc = [-22] 04:26:40 executing program 4: 04:26:40 executing program 2: 04:26:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1300, 0x0) 04:26:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc0) 04:26:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:40 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x06Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) socket$inet_sctp(0x2, 0x0, 0x84) creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(0x0, 0x0) [ 1643.724456][T19934] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1643.724456][T19934] i:0.mC0w[YH [ 1643.724456][T19934] #<^):4<] 04:26:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1400, 0x0) 04:26:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x300) 04:26:40 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\aY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1643.792862][T19934] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1643.792862][T19934] LLnCq2] [ 1643.804677][T19934] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1643.817866][T19934] Error parsing options; rc = [-22] 04:26:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1500, 0x0) [ 1643.989827][T19962] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1643.989827][T19962] i:0.mC0w[YH [ 1643.989827][T19962] #<^):4<] [ 1644.047427][T19962] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1644.047427][T19962] LLnCq2] [ 1644.078968][T19962] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1644.110782][T19962] Error parsing options; rc = [-22] [ 1644.113548][T19969] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1644.113548][T19969] i:0.mC0w[YH [ 1644.113548][T19969] #<^):4<] [ 1644.163908][T19969] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1644.163908][T19969] LLnCq2] [ 1644.187522][T19969] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1644.203531][T19969] Error parsing options; rc = [-22] 04:26:44 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) r3 = dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) futimesat(r3, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0x7530}}) readahead(r3, 0x10000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) 04:26:44 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x45e881, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) shutdown(0xffffffffffffffff, 0x2) recvmsg(0xffffffffffffffff, &(0x7f0000003480)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x200004) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000080)={0x7a2c, 0x5, 0x0, @broadcast, 'veth0_to_batadv\x00'}) 04:26:44 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x408) 04:26:44 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x4000, 0x0) 04:26:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:44 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\bY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1647.917198][T19983] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1647.917198][T19983] i:0.mC0w[YH [ 1647.917198][T19983] #<^):4<] [ 1647.952117][T19991] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i 04:26:44 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x4100, 0x0) [ 1647.952117][T19991] i:0.mC0w[YH [ 1647.952117][T19991] #<^):4<] [ 1647.973804][T19983] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1647.973804][T19983] LLnCq2] [ 1648.004756][T19991] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1648.004756][T19991] LLnCq2] 04:26:44 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x500) 04:26:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x44, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}, 0x9}, 0x0) [ 1648.030508][T19991] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1648.037255][T19983] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1648.064751][T19991] Error parsing options; rc = [-22] [ 1648.165501][T19983] Error parsing options; rc = [-22] 04:26:44 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x8100, 0x0) 04:26:44 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') fcntl$getflags(0xffffffffffffffff, 0x401) setns(r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf0}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x34}}, 0x0) clone(0x14124902, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x44) prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc0f8565c, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, @pix_mp={0x7ff, 0x0, 0x0, 0x3, 0x3, [{0x0, 0x7ff}, {0xffff, 0x2}, {0x6}, {0x1, 0x18000000}, {0x0, 0x7}, {}, {0x0, 0x3}, {0x0, 0x8000}], 0x0, 0x0, 0x0, 0x2, 0x2}}, 0x3}) [ 1654.154383][ T27] audit: type=1804 audit(1585888010.731:164): pid=20027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/183/file0/bus" dev="ramfs" ino=62418 res=1 [ 1654.180413][ T27] audit: type=1804 audit(1585888010.731:165): pid=20027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/183/file0/bus" dev="ramfs" ino=62418 res=1 [ 1654.207851][ T27] audit: type=1804 audit(1585888010.731:166): pid=20027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/183/file0/bus" dev="ramfs" ino=62418 res=1 [ 1654.351229][ T27] audit: type=1804 audit(1585888010.931:167): pid=20030 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/183/file0/file0/bus" dev="ramfs" ino=62419 res=1 04:26:50 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@random="abdb9b62c028", @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast}, {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}, 0x0) 04:26:50 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\tY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:26:50 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x600) 04:26:50 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xf000, 0x0) 04:26:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:50 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') fcntl$getflags(0xffffffffffffffff, 0x401) setns(r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf0}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x34}}, 0x0) clone(0x14124902, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x44) prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc0f8565c, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, @pix_mp={0x7ff, 0x0, 0x0, 0x3, 0x3, [{0x0, 0x7ff}, {0xffff, 0x2}, {0x6}, {0x1, 0x18000000}, {0x0, 0x7}, {}, {0x0, 0x3}, {0x0, 0x8000}], 0x0, 0x0, 0x0, 0x2, 0x2}}, 0x3}) [ 1654.377518][ T27] audit: type=1804 audit(1585888010.931:168): pid=20029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir048130181/syzkaller.SfKJLH/183/file0/file0/bus" dev="ramfs" ino=62419 res=1 [ 1654.460908][T20040] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1654.460908][T20040] i:0.mC0w[ YH [ 1654.460908][T20040] #<^):4<] 04:26:51 executing program 2: 04:26:51 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfdef, 0x0) [ 1654.513376][T20040] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1654.513376][T20040] LLnCq2] [ 1654.549201][T20040] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:26:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:26:51 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x804) [ 1654.609326][T20040] Error parsing options; rc = [-22] 04:26:51 executing program 2: 04:26:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\nY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1654.813446][T20069] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1654.813446][T20069] i:0.mC0w[ [ 1654.813446][T20069] YH [ 1654.813446][T20069] #<^):4<] [ 1654.853014][T20072] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1654.853014][T20072] i:0.mC0w[ [ 1654.853014][T20072] YH [ 1654.853014][T20072] #<^):4<] [ 1654.877337][T20069] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1654.877337][T20069] LLnCq2] [ 1654.878515][T20072] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1654.878515][T20072] LLnCq2] [ 1654.901388][T20072] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1654.915668][T20072] Error parsing options; rc = [-22] [ 1654.965267][T20069] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1654.978488][T20069] Error parsing options; rc = [-22] 04:27:01 executing program 4: 04:27:01 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffe0, 0x0) 04:27:01 executing program 2: 04:27:01 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x900) 04:27:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) 04:27:01 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\vY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1664.854542][T20086] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1664.854542][T20086] i:0.mC0w[ YH [ 1664.854542][T20086] #<^):4<] 04:27:01 executing program 2: 04:27:01 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x20003041, 0x0) [ 1664.924341][T20086] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1664.924341][T20086] LLnCq2] 04:27:01 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc00) [ 1664.962457][T20086] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1665.012310][T20095] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1665.012310][T20095] i:0.mC0w[ YH [ 1665.012310][T20095] #<^):4<] 04:27:01 executing program 2: 04:27:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) [ 1665.098569][T20086] Error parsing options; rc = [-22] [ 1665.116307][T20095] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1665.116307][T20095] LLnCq2] 04:27:01 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7ffff000, 0x0) [ 1665.149854][T20095] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1665.188807][T20095] Error parsing options; rc = [-22] 04:27:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 04:27:05 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_BRIDGE={0x4}]}]}, 0x28}}, 0x0) 04:27:05 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd00) 04:27:05 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\fY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:05 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff8000, 0x0) 04:27:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) 04:27:05 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffff000, 0x0) [ 1669.132320][T20133] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1669.132320][T20133] i:0.mC0w[ YH [ 1669.132320][T20133] #<^):4<] 04:27:05 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1200) [ 1669.179528][T20133] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1669.179528][T20133] LLnCq2] [ 1669.196351][T20133] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:27:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}, 0x3f}], 0x2, 0x0, 0x0) [ 1669.219692][T20140] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1669.219692][T20140] i:0.mC0w[ YH [ 1669.219692][T20140] #<^):4<] 04:27:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) 04:27:05 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffffdef, 0x0) [ 1669.319587][T20133] Error parsing options; rc = [-22] [ 1669.325217][T20140] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1669.325217][T20140] LLnCq2] [ 1669.387225][T20140] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:27:06 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1800) [ 1669.433241][T20140] Error parsing options; rc = [-22] 04:27:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 04:27:11 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\rY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:11 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffffffe0, 0x0) 04:27:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) 04:27:11 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3f00) 04:27:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}, 0x3f}], 0x2, 0x0, 0x0) [ 1675.459680][T20181] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1675.459680][T20181] i:0.mC0w[ YH [ 1675.459680][T20181] #<^):4<] 04:27:12 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x7ffffffffffff, 0x0) [ 1675.533410][T20181] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1675.533410][T20181] LLnCq2] 04:27:12 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4000) [ 1675.595310][T20181] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1675.600276][T20190] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1675.600276][T20190] i:0.mC0w[ YH [ 1675.600276][T20190] #<^):4<] 04:27:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) [ 1675.657329][T20181] Error parsing options; rc = [-22] 04:27:12 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff888128dc4028, 0x0) 04:27:12 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7300) 04:27:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}, 0x3f}], 0x2, 0x0, 0x0) [ 1675.875333][T20190] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1675.875333][T20190] LLnCq2] [ 1675.897217][T20190] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1675.964651][T20190] Error parsing options; rc = [-22] 04:27:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 04:27:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:27:19 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff888128dc47a8, 0x0) 04:27:19 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7500) 04:27:19 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x0eY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}, 0x3f}], 0x2, 0x0, 0x0) [ 1682.814040][T20227] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1682.814040][T20227] i:0.mC0w[YH [ 1682.814040][T20227] #<^):4<] [ 1682.897313][T20227] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1682.897313][T20227] LLnCq2] 04:27:19 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffff888128dc4f28, 0x0) 04:27:19 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8008) [ 1682.944546][T20227] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1682.998672][T20227] Error parsing options; rc = [-22] 04:27:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:27:19 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x0fY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:19 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffffffffffff000, 0x0) [ 1683.175634][T20249] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1683.175634][T20249] i:0.mC0w[YH [ 1683.175634][T20249] #<^):4<] 04:27:19 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc000) [ 1683.223277][T20249] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1683.223277][T20249] LLnCq2] [ 1683.248437][T20249] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1683.249636][T20254] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1683.249636][T20254] i:0.mC0w[YH [ 1683.249636][T20254] #<^):4<] [ 1683.276841][T20249] Error parsing options; rc = [-22] [ 1683.351458][T20254] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1683.351458][T20254] LLnCq2] [ 1683.372925][T20254] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1683.398353][T20254] Error parsing options; rc = [-22] 04:27:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:27:26 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff01) 04:27:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:26 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xfffffffffffffdef, 0x0) 04:27:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) recvmmsg(r2, &(0x7f0000003540)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 04:27:26 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x10Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1690.105091][T20280] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1690.105091][T20280] i:0.mC0w[YH [ 1690.105091][T20280] #<^):4<] [ 1690.137862][T20280] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1690.137862][T20280] LLnCq2] 04:27:26 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff0f) 04:27:26 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0xffffffffffffffe0, 0x0) [ 1690.164812][T20280] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1690.195283][T20280] Error parsing options; rc = [-22] 04:27:26 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x11Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:27:26 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x20000) 04:27:27 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x2) [ 1690.395874][T20298] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1690.395874][T20298] i:0.mC0w[YH [ 1690.395874][T20298] #<^):4<] [ 1690.493205][T20305] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1690.493205][T20305] i:0.mC0w[YH [ 1690.493205][T20305] #<^):4<] [ 1690.542995][T20298] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1690.542995][T20298] LLnCq2] [ 1690.578777][T20305] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1690.578777][T20305] LLnCq2] [ 1690.585046][T20298] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1690.634790][T20305] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1690.697885][T20305] Error parsing options; rc = [-22] [ 1690.703497][T20298] Error parsing options; rc = [-22] 04:27:35 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff010026a6273dd6e8df1cd400", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 04:27:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) 04:27:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:35 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x24dba) 04:27:35 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3) 04:27:35 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x12Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1699.464539][T20327] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1699.464539][T20327] i:0.mC0w[YH [ 1699.464539][T20327] #<^):4<] [ 1699.528862][T20327] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1699.528862][T20327] LLnCq2] [ 1699.556842][T20327] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:27:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:36 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4) 04:27:36 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x80000) [ 1699.572736][T20337] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1699.572736][T20337] i:0.mC0w[YH [ 1699.572736][T20337] #<^):4<] [ 1699.603957][T20327] Error parsing options; rc = [-22] [ 1699.617105][T20337] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1699.617105][T20337] LLnCq2] 04:27:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x1}}, 0x18) [ 1699.642295][T20337] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1699.710040][T20337] Error parsing options; rc = [-22] 04:27:36 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x13Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:36 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x100000) [ 1699.927591][T20358] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1699.927591][T20358] i:0.mC0w[YH [ 1699.927591][T20358] #<^):4<] [ 1699.955402][T20364] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1699.955402][T20364] i:0.mC0w[YH [ 1699.955402][T20364] #<^):4<] [ 1699.976806][T20358] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1699.976806][T20358] LLnCq2] [ 1699.981611][T20364] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1699.981611][T20364] LLnCq2] [ 1699.988561][T20358] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1699.999820][T20364] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1700.026872][T20364] Error parsing options; rc = [-22] [ 1700.044630][T20358] Error parsing options; rc = [-22] [ 1705.672860][T20372] device vxlan0 entered promiscuous mode 04:27:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x3d, 0x0, "a3cc25cd8b71fce55c57f9175e48ffc428397f4a9dbd18410dfb81c120bfd02561190478d6fbfdc53ddf937aaf10b37198d6b03d74d942046c39507f84990c0678099971f64ac90a954914b81f9c1ecb"}, 0xd8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x5e, &(0x7f0000000380)={@local, @random="f8968583fe20", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "080440", 0x28, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf317901c738b823619bc18f06ead949"}]}}}}}}}}, 0x0) 04:27:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:42 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x5) 04:27:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, 0x0, 0x0) 04:27:42 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x800000) 04:27:42 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x14Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:42 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x6) 04:27:42 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x15Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1706.079368][ T27] audit: type=1800 audit(1585888062.661:169): pid=20385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17069 res=0 [ 1706.097415][T20401] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1706.097415][T20401] i:0.mC0w[YH [ 1706.097415][T20401] #<^):4<] 04:27:42 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8) 04:27:42 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1000000) [ 1706.133569][T20401] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1706.133569][T20401] LLnCq2] [ 1706.163626][T20401] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1706.177962][T20401] Error parsing options; rc = [-22] 04:27:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, 0x0, 0x0) [ 1706.510157][ T27] audit: type=1800 audit(1585888063.091:170): pid=20416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17066 res=0 [ 1712.150772][T20426] MD5 Hash mismatch for [fe80::aa]:0->[fe80::aa]:20002 L3 index 0 04:27:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 04:27:49 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x16Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:49 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x9) 04:27:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, 0x0, 0x0) 04:27:49 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x2000000) [ 1713.294494][T20435] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1713.294494][T20435] i:0.mC0w[YH [ 1713.294494][T20435] #<^):4<] [ 1713.315758][ T27] audit: type=1800 audit(1585888069.871:171): pid=20430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17072 res=0 04:27:49 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3000000) 04:27:49 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x17Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1713.343376][T20435] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1713.343376][T20435] LLnCq2] [ 1713.359677][T20435] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1713.375529][T20435] Error parsing options; rc = [-22] 04:27:50 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc) 04:27:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {0x0, r3, 0x1}}, 0x18) [ 1713.556769][ T27] audit: type=1800 audit(1585888070.131:172): pid=20450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17071 res=0 04:27:50 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4000000) [ 1713.646965][T20462] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1713.646965][T20462] i:0.mC0w[YH [ 1713.646965][T20462] #<^):4<] [ 1713.701194][T20462] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1713.701194][T20462] LLnCq2] [ 1713.748751][T20462] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1713.768848][T20462] Error parsing options; rc = [-22] [ 1713.796515][T20473] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1713.796515][T20473] i:0.mC0w[YH [ 1713.796515][T20473] #<^):4<] [ 1713.826287][T20473] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1713.826287][T20473] LLnCq2] [ 1713.848250][T20473] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1713.861545][T20473] Error parsing options; rc = [-22] [ 1713.891110][ T27] audit: type=1800 audit(1585888070.471:173): pid=20472 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17080 res=0 04:27:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_GROUP_ADDR={0xa, 0x14, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}}}]}, 0x40}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0xffffffff, @rand_addr="b300dd6d00f7f80100010800"}]}, &(0x7f00000000c0)=0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) exit(0xfffffffffffffff8) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f00000000c0)=""/39, 0x27) mknodat(r3, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_void(r3, 0x1, 0x0, 0x0, 0x0) 04:27:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd) 04:27:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {0x0, r3, 0x1}}, 0x18) 04:27:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:58 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x18Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:27:58 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x5000000) [ 1721.689361][T20495] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1721.689361][T20495] i:0.mC0w[YH [ 1721.689361][T20495] #<^):4<] 04:27:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x10) [ 1721.746755][T20495] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1721.746755][T20495] LLnCq2] [ 1721.770818][ T27] audit: type=1800 audit(1585888078.351:174): pid=20493 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16822 res=0 04:27:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {0x0, r3, 0x1}}, 0x18) [ 1721.791831][T20495] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1721.792939][T20496] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1721.792939][T20496] i:0.mC0w[YH [ 1721.792939][T20496] #<^):4<] [ 1721.817077][T20495] Error parsing options; rc = [-22] 04:27:58 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x6000000) 04:27:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:27:58 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x19Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1721.953845][T20496] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1721.953845][T20496] LLnCq2] 04:27:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x11) [ 1722.013328][T20496] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1722.061454][T20520] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1722.061454][T20520] i:0.mC0w[YH [ 1722.061454][T20520] #<^):4<] [ 1722.092684][T20496] Error parsing options; rc = [-22] [ 1722.119969][ T27] audit: type=1800 audit(1585888078.681:175): pid=20516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16801 res=0 [ 1722.141076][T20520] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1722.141076][T20520] LLnCq2] [ 1722.183630][T20527] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1722.183630][T20527] i:0.mC0w[YH [ 1722.183630][T20527] #<^):4<] [ 1722.229133][T20520] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1722.250365][T20527] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1722.250365][T20527] LLnCq2] [ 1722.252684][T20520] Error parsing options; rc = [-22] [ 1722.275447][T20527] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1722.295270][T20527] Error parsing options; rc = [-22] 04:28:04 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8000000) 04:28:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) 04:28:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x12) 04:28:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0xb}, 0x10) 04:28:04 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x1aY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1728.242229][T20550] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1728.242229][T20550] i:0.mC0w[YH [ 1728.242229][T20550] #<^):4<] 04:28:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x13) [ 1728.297620][T20550] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1728.297620][T20550] LLnCq2] [ 1728.313218][ T27] audit: type=1800 audit(1585888084.891:176): pid=20548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16913 res=0 [ 1728.318137][T20550] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:28:04 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8040000) 04:28:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1728.385623][T20550] Error parsing options; rc = [-22] 04:28:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) 04:28:05 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x1bY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:05 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x15) 04:28:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1728.560490][T20570] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1728.560490][T20570] i:0.mC0w[YH [ 1728.560490][T20570] #<^):4<] [ 1728.625646][T20570] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1728.625646][T20570] LLnCq2] 04:28:05 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8800000) [ 1728.658795][ T27] audit: type=1800 audit(1585888085.231:177): pid=20567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16854 res=0 [ 1728.671648][T20570] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:28:05 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x300) [ 1728.747869][T20582] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1728.747869][T20582] i:0.mC0w[YH [ 1728.747869][T20582] #<^):4<] [ 1728.766607][T20570] Error parsing options; rc = [-22] 04:28:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), 0xffffffffffffffff, 0x1}}, 0x18) [ 1728.858943][T20582] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1728.858943][T20582] LLnCq2] [ 1728.884528][T20582] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1728.931636][T20582] Error parsing options; rc = [-22] 04:28:15 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@ng, 0x2, 0x3) 04:28:15 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x9000000) 04:28:15 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:15 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x1cY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:15 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x408) 04:28:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) [ 1738.630419][T20616] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1738.630419][T20616] i:0.mC0w[YH [ 1738.630419][T20616] #<^):4<] [ 1738.659758][T20621] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1738.659758][T20621] i:0.mC0w[YH [ 1738.659758][T20621] #<^):4<] [ 1738.691673][T20616] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1738.691673][T20616] LLnCq2] [ 1738.712032][T20621] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1738.712032][T20621] LLnCq2] [ 1738.727484][T20616] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:28:15 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc000000) 04:28:15 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x500) [ 1738.749879][T20621] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1738.782285][T20616] Error parsing options; rc = [-22] [ 1738.810005][T20621] Error parsing options; rc = [-22] 04:28:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:28:15 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x1dY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:15 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd000000) [ 1739.022595][T20637] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1739.022595][T20637] i:0.mC0w[YH [ 1739.022595][T20637] #<^):4<] 04:28:15 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x600) [ 1739.103222][T20644] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1739.103222][T20644] i:0.mC0w[YH [ 1739.103222][T20644] #<^):4<] [ 1739.135299][T20637] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1739.135299][T20637] LLnCq2] [ 1739.167164][T20644] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1739.167164][T20644] LLnCq2] [ 1739.167944][T20637] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1739.179090][T20644] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1739.217329][T20644] Error parsing options; rc = [-22] [ 1739.223050][T20637] Error parsing options; rc = [-22] 04:28:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1a, &(0x7f0000000000), 0x20a154cc) 04:28:24 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x12000000) 04:28:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:28:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x804) 04:28:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x1eY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1747.886250][T20664] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1747.886250][T20664] i:0.mC0w[YH [ 1747.886250][T20664] #<^):4<] 04:28:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x900) [ 1747.937519][T20664] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1747.937519][T20664] LLnCq2] [ 1747.965157][T20664] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:28:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x18000000) [ 1748.016973][T20664] Error parsing options; rc = [-22] 04:28:24 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000140)) readv(r0, &(0x7f0000000380)=[{&(0x7f0000001a80)=""/102400, 0x19000}], 0x1) 04:28:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[!Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:24 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:24 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1748.269039][T20685] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1748.269039][T20685] i:0.mC0w[!YH [ 1748.269039][T20685] #<^):4<] [ 1748.331241][T20685] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1748.331241][T20685] LLnCq2] [ 1748.382967][T20685] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1748.398298][T20694] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1748.398298][T20694] i:0.mC0w[!YH [ 1748.398298][T20694] #<^):4<] [ 1748.419056][T20685] Error parsing options; rc = [-22] [ 1748.419631][T20694] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1748.419631][T20694] LLnCq2] [ 1748.438843][T20694] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1748.454771][T20694] Error parsing options; rc = [-22] 04:28:30 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:30 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc00) 04:28:30 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3f000000) 04:28:30 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\"Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:30 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:30 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1754.153588][T20712] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1754.153588][T20712] i:0.mC0w["YH [ 1754.153588][T20712] #<^):4<] 04:28:30 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x40000000) 04:28:30 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd00) [ 1754.235556][T20712] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1754.235556][T20712] LLnCq2] 04:28:30 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1754.275355][T20712] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1754.312291][T20718] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1754.312291][T20718] i:0.mC0w["YH [ 1754.312291][T20718] #<^):4<] [ 1754.361669][T20712] Error parsing options; rc = [-22] [ 1754.367141][T20718] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1754.367141][T20718] LLnCq2] [ 1754.390442][T20718] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:28:31 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x73000000) [ 1754.409740][T20718] Error parsing options; rc = [-22] 04:28:31 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[#Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:31 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1100) [ 1754.557114][T20732] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1754.557114][T20732] i:0.mC0w[#YH [ 1754.557114][T20732] #<^):4<] [ 1754.590890][T20732] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1754.590890][T20732] LLnCq2] [ 1754.622294][T20732] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1754.646109][T20732] Error parsing options; rc = [-22] 04:28:37 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:37 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:28:37 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x75000000) 04:28:37 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1200) 04:28:37 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[$Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:37 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1300) [ 1760.519404][T20755] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1760.519404][T20755] i:0.mC0w[$YH [ 1760.519404][T20755] #<^):4<] 04:28:37 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:37 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xba4d0200) [ 1760.618792][T20755] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1760.618792][T20755] LLnCq2] [ 1760.633646][T20761] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1760.633646][T20761] i:0.mC0w[$YH [ 1760.633646][T20761] #<^):4<] 04:28:37 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1500) 04:28:37 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc0000000) 04:28:37 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[%Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1760.788974][T20755] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1760.828770][T20755] Error parsing options; rc = [-22] [ 1760.858843][T20761] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1760.858843][T20761] LLnCq2] 04:28:37 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1f00) [ 1760.903568][T20761] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:28:37 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1760.948719][T20761] Error parsing options; rc = [-22] [ 1761.076675][T20784] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1761.076675][T20784] i:0.mC0w[%YH [ 1761.076675][T20784] #<^):4<] [ 1761.131863][T20784] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1761.131863][T20784] LLnCq2] [ 1761.146996][T20784] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1761.163148][T20784] Error parsing options; rc = [-22] 04:28:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:28:45 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:45 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xe4ffffff) 04:28:45 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3f00) 04:28:45 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:45 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[&Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1769.122882][T20807] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1769.122882][T20807] i:0.mC0w[&YH [ 1769.122882][T20807] #<^):4<] 04:28:45 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:45 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1769.161628][T20812] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1769.161628][T20812] i:0.mC0w[&YH [ 1769.161628][T20812] #<^):4<] 04:28:45 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf4ffffff) 04:28:45 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4000) [ 1769.229832][T20807] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1769.229832][T20807] LLnCq2] [ 1769.265998][T20812] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1769.265998][T20812] LLnCq2] [ 1769.279079][T20807] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:28:45 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1769.338743][T20812] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1769.346633][T20807] Error parsing options; rc = [-22] 04:28:46 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf5ffffff) [ 1769.391957][T20812] Error parsing options; rc = [-22] 04:28:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:28:52 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8008) 04:28:52 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfbffffff) 04:28:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\'Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:52 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:52 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1775.560879][T20845] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1775.560879][T20845] i:0.mC0w['YH [ 1775.560879][T20845] #<^):4<] [ 1775.612721][T20845] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1775.612721][T20845] LLnCq2] [ 1775.628850][T20845] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1775.643537][T20854] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1775.643537][T20854] i:0.mC0w['YH 04:28:52 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfeffffff) 04:28:52 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff01) [ 1775.643537][T20854] #<^):4<] [ 1775.664753][T20845] Error parsing options; rc = [-22] [ 1775.670502][T20854] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1775.670502][T20854] LLnCq2] [ 1775.689325][T20854] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1775.707916][T20854] Error parsing options; rc = [-22] 04:28:52 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:28:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[(Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:28:52 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff010000) 04:28:52 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:00 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff0f0000) 04:29:00 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff0f) 04:29:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00)}}, 0x18) 04:29:00 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[)Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:00 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:00 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1784.157551][T20891] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1784.157551][T20891] i:0.mC0w[)YH [ 1784.157551][T20891] #<^):4<] [ 1784.193943][T20896] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1784.193943][T20896] i:0.mC0w[)YH [ 1784.193943][T20896] #<^):4<] [ 1784.218187][T20891] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1784.218187][T20891] LLnCq2] [ 1784.232815][T20896] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1784.232815][T20896] LLnCq2] 04:29:00 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffefffff) 04:29:00 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x20000) [ 1784.261728][T20891] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:00 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:00 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1784.314935][T20896] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1784.364305][T20891] Error parsing options; rc = [-22] [ 1784.388838][T20896] Error parsing options; rc = [-22] 04:29:01 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffefff) 04:29:01 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x24de3) 04:29:01 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[*Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:01 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffff7f) 04:29:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00)}}, 0x18) 04:29:08 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x80000) 04:29:08 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffe4) 04:29:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[+Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:08 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffff4) [ 1791.490748][T20939] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1791.490748][T20939] i:0.mC0w[+YH [ 1791.490748][T20939] #<^):4<] [ 1791.539948][T20943] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1791.539948][T20943] i:0.mC0w[+YH [ 1791.539948][T20943] #<^):4<] 04:29:08 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1791.618848][T20939] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1791.618848][T20939] LLnCq2] 04:29:08 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x100000) 04:29:08 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffff5) [ 1791.664906][T20943] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1791.664906][T20943] LLnCq2] [ 1791.696759][T20939] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1791.720720][T20943] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:08 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1791.769908][T20943] Error parsing options; rc = [-22] [ 1791.787571][T20939] Error parsing options; rc = [-22] 04:29:08 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00)}}, 0x18) 04:29:17 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x800000) 04:29:17 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffffb) 04:29:17 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:17 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[,Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:17 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1800.945170][T20976] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1800.945170][T20976] i:0.mC0w[] [ 1800.993473][T20976] ecryptfs_parse_options: eCryptfs: unrecognized option [YH [ 1800.993473][T20976] #<^):4<] [ 1801.037048][T20977] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1801.037048][T20977] i:0.mC0w[] [ 1801.064793][T20976] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1801.064793][T20976] LLnCq2] 04:29:17 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffffe) [ 1801.079156][T20976] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1801.092673][T20977] ecryptfs_parse_options: eCryptfs: unrecognized option [YH [ 1801.092673][T20977] #<^):4<] [ 1801.104464][T20977] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1801.104464][T20977] LLnCq2] 04:29:17 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1801.118999][ T27] audit: type=1800 audit(1585888157.701:178): pid=20985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16849 res=0 [ 1801.124633][T20976] Error parsing options; rc = [-22] 04:29:17 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1801.186911][T20977] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:17 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1000000) 04:29:17 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[-Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1801.232497][T20977] Error parsing options; rc = [-22] 04:29:17 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffff000) [ 1801.431520][T21007] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1801.431520][T21007] i:0.mC0w[-YH [ 1801.431520][T21007] #<^):4<] [ 1801.454514][ T27] audit: type=1800 audit(1585888158.031:179): pid=21006 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16659 res=0 [ 1801.461836][T21015] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1801.461836][T21015] i:0.mC0w[-YH [ 1801.461836][T21015] #<^):4<] [ 1801.520792][T21007] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1801.520792][T21007] LLnCq2] [ 1801.535048][T21007] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1801.548499][T21015] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1801.548499][T21015] LLnCq2] [ 1801.563376][T21007] Error parsing options; rc = [-22] [ 1801.568174][T21015] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1801.582348][T21015] Error parsing options; rc = [-22] 04:29:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:29:24 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x2000000) 04:29:24 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x800800000000) 04:29:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[.Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:24 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1807.531339][T21027] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1807.531339][T21027] i:0.mC0w[.YH [ 1807.531339][T21027] #<^):4<] [ 1807.615691][T21027] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1807.615691][T21027] LLnCq2] [ 1807.650642][ T27] audit: type=1800 audit(1585888164.231:180): pid=21031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16834 res=0 [ 1807.672596][T21034] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1807.672596][T21034] i:0.mC0w[.YH [ 1807.672596][T21034] #<^):4<] [ 1807.688555][T21027] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1000000000000) 04:29:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3000000) [ 1807.713216][T21027] Error parsing options; rc = [-22] 04:29:24 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1807.754544][T21034] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1807.754544][T21034] LLnCq2] 04:29:24 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1807.805906][T21034] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x2000000000000) [ 1807.864129][ T27] audit: type=1800 audit(1585888164.441:181): pid=21045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16801 res=0 [ 1807.898783][T21034] Error parsing options; rc = [-22] 04:29:32 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[/Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:32 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4000000) 04:29:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:29:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7ffffffffffff) 04:29:32 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:32 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1816.043198][T21071] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 04:29:32 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1816.087994][T21072] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1816.087994][T21072] i:0.mC0w[/YH [ 1816.087994][T21072] #<^):4<] 04:29:32 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1816.180254][T21072] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1816.180254][T21072] LLnCq2] [ 1816.201838][T21082] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1816.201838][T21082] i:0.mC0w[/YH [ 1816.201838][T21082] #<^):4<] 04:29:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8000000000000) [ 1816.221825][T21088] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1816.223094][ T27] audit: type=1800 audit(1585888172.791:182): pid=21073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16849 res=0 [ 1816.232865][T21072] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:32 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:32 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x5000000) 04:29:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x10000000000000) [ 1816.360002][T21082] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1816.360002][T21082] LLnCq2] [ 1816.398125][T21082] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1816.426305][T21072] Error parsing options; rc = [-22] [ 1816.438819][T21082] Error parsing options; rc = [-22] [ 1816.446581][T21095] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 04:29:33 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[0Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:33 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1816.589161][ T27] audit: type=1800 audit(1585888173.171:183): pid=21102 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16954 res=0 [ 1816.649126][T21111] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1816.649126][T21111] i:0.mC0w[0YH [ 1816.649126][T21111] #<^):4<] [ 1816.672961][T21113] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1816.672961][T21113] i:0.mC0w[0YH [ 1816.672961][T21113] #<^):4<] [ 1816.697115][T21111] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1816.697115][T21111] LLnCq2] [ 1816.731173][T21113] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1816.731173][T21113] LLnCq2] [ 1816.757515][T21111] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1816.773796][T21113] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1816.787083][T21111] Error parsing options; rc = [-22] [ 1816.796218][T21113] Error parsing options; rc = [-22] 04:29:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:29:39 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:39 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x80000000000000) 04:29:39 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x6000000) 04:29:39 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[1Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:39 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:39 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1823.404821][T21129] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1823.404821][T21129] i:0.mC0w[1YH [ 1823.404821][T21129] #<^):4<] 04:29:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf0ffffff0f0000) 04:29:40 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1823.505215][T21135] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1823.505215][T21135] i:0.mC0w[1YH [ 1823.505215][T21135] #<^):4<] [ 1823.531277][ T27] audit: type=1800 audit(1585888180.111:184): pid=21128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16834 res=0 04:29:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8000000) 04:29:40 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1823.601832][T21129] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1823.601832][T21129] LLnCq2] [ 1823.648307][T21129] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1823.683175][T21135] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1823.683175][T21135] LLnCq2] 04:29:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x100000000000000) [ 1823.701417][T21129] Error parsing options; rc = [-22] [ 1823.728828][T21135] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1823.780255][T21135] Error parsing options; rc = [-22] [ 1823.830129][ T27] audit: type=1800 audit(1585888180.411:185): pid=21148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16835 res=0 04:29:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:29:49 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) 04:29:49 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:49 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[2Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:49 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8040000) 04:29:49 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x200000000000000) 04:29:49 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x300000000000000) [ 1832.769542][T21174] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1832.769542][T21174] i:0.mC0w[2YH [ 1832.769542][T21174] #<^):4<] 04:29:49 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) [ 1832.842806][T21174] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1832.842806][T21174] LLnCq2] 04:29:49 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1832.905165][ T27] audit: type=1800 audit(1585888189.481:186): pid=21175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16977 res=0 [ 1832.939256][T21174] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:49 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8800000) 04:29:49 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x400000000000000) [ 1832.954394][T21174] Error parsing options; rc = [-22] 04:29:49 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) 04:29:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:29:56 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[3Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:29:56 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x9000000) 04:29:56 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0), 0x0) 04:29:56 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x500000000000000) 04:29:56 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:29:56 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc000000) [ 1840.106948][T21216] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1840.106948][T21216] i:0.mC0w[3YH [ 1840.106948][T21216] #<^):4<] 04:29:56 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x600000000000000) [ 1840.151787][T21216] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1840.151787][T21216] LLnCq2] [ 1840.177300][T21216] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:29:56 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0), 0x0) [ 1840.205803][T21219] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1840.205803][T21219] i:0.mC0w[3YH [ 1840.205803][T21219] #<^):4<] 04:29:56 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x800000000000000) 04:29:56 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0), 0x0) 04:29:56 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1840.318798][T21216] Error parsing options; rc = [-22] [ 1840.325439][T21219] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1840.325439][T21219] LLnCq2] [ 1840.362482][T21219] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1840.460946][T21219] Error parsing options; rc = [-22] 04:30:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:30:05 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd000000) 04:30:05 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:30:05 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{0x0}], 0x1) 04:30:05 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x804000000000000) 04:30:05 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[4Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:30:06 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[5Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1849.447753][T21254] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 04:30:06 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x11000000) 04:30:06 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{0x0}], 0x1) 04:30:06 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x900000000000000) 04:30:06 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1849.596517][T21262] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1849.596517][T21262] i:0.mC0w[5YH [ 1849.596517][T21262] #<^):4<] [ 1849.651119][T21262] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1849.651119][T21262] LLnCq2] [ 1849.675042][T21269] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 04:30:06 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{0x0}], 0x1) [ 1849.703504][T21272] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1849.703504][T21272] i:0.mC0w[5YH [ 1849.703504][T21272] #<^):4<] [ 1849.722168][T21262] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1849.798776][T21272] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1849.798776][T21272] LLnCq2] [ 1849.843121][T21272] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1849.844695][T21262] Error parsing options; rc = [-22] [ 1849.902098][T21272] Error parsing options; rc = [-22] 04:30:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:30:15 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x12000000) 04:30:15 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:30:15 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)}], 0x1) 04:30:15 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc00000000000000) 04:30:15 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[6Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1858.793824][T21289] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 04:30:15 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)}], 0x1) [ 1858.833256][T21294] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1858.833256][T21294] i:0.mC0w[6YH [ 1858.833256][T21294] #<^):4<] 04:30:15 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd00000000000000) 04:30:15 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x13000000) 04:30:15 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:30:15 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)}], 0x1) [ 1858.927990][T21300] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1858.927990][T21300] i:0.mC0w[6YH [ 1858.927990][T21300] #<^):4<] [ 1859.038401][T21294] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1859.038401][T21294] LLnCq2] 04:30:15 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1859.092929][T21300] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1859.092929][T21300] LLnCq2] [ 1859.155263][T21294] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1859.169776][T21300] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1859.225589][T21294] Error parsing options; rc = [-22] [ 1859.254355][T21300] Error parsing options; rc = [-22] 04:30:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:30:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1200000000000000) 04:30:24 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) 04:30:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x15000000) 04:30:24 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:30:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[7Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:30:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1f000000) [ 1868.114090][T21333] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1868.114090][T21333] i:0.mC0w[7YH [ 1868.114090][T21333] #<^):4<] [ 1868.146605][T21340] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1868.146605][T21340] i:0.mC0w[7YH 04:30:24 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) 04:30:24 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) [ 1868.146605][T21340] #<^):4<] [ 1868.176371][T21333] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1868.176371][T21333] LLnCq2] 04:30:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1800000000000000) [ 1868.228754][T21340] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1868.228754][T21340] LLnCq2] [ 1868.281034][T21333] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:30:24 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3f000000) [ 1868.320843][T21340] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:30:24 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) [ 1868.383607][T21333] Error parsing options; rc = [-22] [ 1868.415443][T21340] Error parsing options; rc = [-22] 04:30:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:30:31 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) 04:30:31 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3f00000000000000) 04:30:31 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x40000000) 04:30:31 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) 04:30:31 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[8Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1874.463194][T21373] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1874.463194][T21373] i:0.mC0w[8YH [ 1874.463194][T21373] #<^):4<] 04:30:31 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) 04:30:31 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4000000000000000) 04:30:31 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0), 0x0) [ 1874.543964][T21373] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1874.543964][T21373] LLnCq2] [ 1874.577395][T21373] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:30:31 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xe34d0200) 04:30:31 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[9Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1874.598814][T21373] Error parsing options; rc = [-22] 04:30:31 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0), 0x0) 04:30:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:30:39 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7300000000000000) 04:30:39 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) 04:30:39 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\xeeY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:30:39 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xe4ffffff) 04:30:39 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0), 0x0) [ 1883.093105][T21413] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1883.093105][T21413] i:0.mC0w[YH [ 1883.093105][T21413] #<^):4<] 04:30:39 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) 04:30:39 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf4ffffff) 04:30:39 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{0x0}], 0x1) 04:30:39 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7500000000000000) [ 1883.167578][T21413] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1883.167578][T21413] LLnCq2] [ 1883.237560][T21424] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1883.237560][T21424] i:0.mC0w[YH [ 1883.237560][T21424] #<^):4<] [ 1883.239232][T21413] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:30:39 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) 04:30:39 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf5ffffff) [ 1883.349404][T21424] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1883.349404][T21424] LLnCq2] [ 1883.388783][T21424] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1883.463215][T21413] Error parsing options; rc = [-22] [ 1883.506172][T21424] Error parsing options; rc = [-22] 04:30:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:30:46 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{0x0}], 0x1) 04:30:46 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) 04:30:46 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7fffffffffffffff) 04:30:46 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfbffffff) 04:30:46 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:]\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:30:47 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{0x0}], 0x1) [ 1890.412648][T21453] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1890.412648][T21453] i:0.mC0w[:]H [ 1890.412648][T21453] #<^):4<] 04:30:47 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) 04:30:47 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8000000000000000) [ 1890.468072][T21453] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1890.468072][T21453] LLnCq2] 04:30:47 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00", 0x53}], 0x1) 04:30:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfeffffff) [ 1890.583136][T21453] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:30:47 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)}], 0x1) [ 1890.662072][T21453] Error parsing options; rc = [-22] 04:30:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:30:55 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xba4d020000000000) 04:30:55 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00", 0x53}], 0x1) 04:30:55 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff010000) 04:30:55 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:\xee\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:30:55 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)}], 0x1) 04:30:55 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00", 0x53}], 0x1) [ 1898.935711][T21492] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1898.935711][T21492] i:0.mC0w[:H [ 1898.935711][T21492] #<^):4<] 04:30:55 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)}], 0x1) 04:30:55 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff0f0000) 04:30:55 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc000000000000000) [ 1899.047878][T21492] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1899.047878][T21492] LLnCq2] 04:30:55 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004", 0x56}], 0x1) [ 1899.113528][T21492] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1899.169538][T21492] Error parsing options; rc = [-22] 04:30:55 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) 04:31:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:31:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffefffff) 04:31:04 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2]\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:31:04 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xe4ffffff00000000) 04:31:04 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) 04:31:04 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004", 0x56}], 0x1) [ 1907.598398][T21540] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1907.598398][T21540] i:0.mC0w[:Y] [ 1907.598398][T21540] #<^):4<] [ 1907.629271][T21540] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1907.629271][T21540] LLnCq2] 04:31:04 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) 04:31:04 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004", 0x56}], 0x1) 04:31:04 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2\xee\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1907.654224][T21540] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1907.673623][T21540] Error parsing options; rc = [-22] 04:31:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffefff) 04:31:04 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf4ffffff00000000) [ 1907.796816][T21554] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1907.796816][T21554] i:0.mC0w[:Y [ 1907.796816][T21554] #<^):4<] 04:31:04 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) [ 1907.918141][T21554] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1907.918141][T21554] LLnCq2] [ 1907.943692][T21554] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1907.972175][T21566] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1907.972175][T21566] i:0.mC0w[:Y [ 1907.972175][T21566] #<^):4<] [ 1908.014091][T21554] Error parsing options; rc = [-22] [ 1908.020856][T21566] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1908.020856][T21566] LLnCq2] [ 1908.037642][T21566] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1908.053753][T21566] Error parsing options; rc = [-22] 04:31:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:31:13 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fc", 0x57}], 0x1) 04:31:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffff7f) 04:31:13 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) 04:31:13 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf5ffffff00000000) 04:31:13 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\a#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1916.986200][T21578] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1916.986200][T21578] i:0.mC0w[:YH#<^):4<] 04:31:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffe4) 04:31:13 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fc", 0x57}], 0x1) 04:31:13 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) [ 1917.040871][T21578] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1917.040871][T21578] LLnCq2] [ 1917.069890][T21578] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:31:13 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\x10#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1917.098998][T21578] Error parsing options; rc = [-22] 04:31:13 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfbffffff00000000) 04:31:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffff4) [ 1917.309364][T21602] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1917.309364][T21602] i:0.mC0w[:YH#<^):4<] [ 1917.380492][T21602] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1917.380492][T21602] LLnCq2] [ 1917.393196][T21602] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1917.421869][T21602] Error parsing options; rc = [-22] 04:31:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:31:20 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fc", 0x57}], 0x1) 04:31:20 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) 04:31:20 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffff5) 04:31:20 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfeffffff00000000) 04:31:20 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5%#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:31:20 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) [ 1924.268068][T21623] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1924.268068][T21623] i:0.mC0w[:YH%#<^):4<] 04:31:20 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffffb) 04:31:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:31:20 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff01000000000000) [ 1924.325594][T21627] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1924.325594][T21627] i:0.mC0w[:YH%#<^):4<] [ 1924.349096][T21623] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1924.349096][T21623] LLnCq2] 04:31:21 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfffffffe) [ 1924.435058][T21627] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1924.435058][T21627] LLnCq2] [ 1924.458706][T21623] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:31:21 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) [ 1924.508948][T21627] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1924.564252][T21623] Error parsing options; rc = [-22] [ 1924.583023][T21627] Error parsing options; rc = [-22] 04:31:30 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:31:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:31:30 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff0f000000000000) 04:31:30 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffff000) 04:31:30 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5:#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:31:30 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00", 0x53}], 0x1) [ 1933.521584][T21660] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1933.521584][T21660] i:0.mC0w[:YH:#<^):4<] 04:31:30 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x800800000000) 04:31:30 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00", 0x53}], 0x1) [ 1933.576577][T21660] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1933.576577][T21660] LLnCq2] [ 1933.612378][T21660] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1933.664534][T21660] Error parsing options; rc = [-22] 04:31:30 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00", 0x53}], 0x1) 04:31:30 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffefffff00000000) 04:31:30 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1000000000000) 04:31:30 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\xee#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1933.921475][T21691] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1933.921475][T21691] i:0.mC0w[:YH#<^):4<] [ 1933.978484][T21691] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1933.978484][T21691] LLnCq2] [ 1933.994303][T21695] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1933.994303][T21695] i:0.mC0w[:YH#<^):4<] [ 1934.015881][T21691] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1934.032420][T21695] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1934.032420][T21695] LLnCq2] [ 1934.044364][T21691] Error parsing options; rc = [-22] [ 1934.052137][T21695] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1934.065204][T21695] Error parsing options; rc = [-22] 04:31:34 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:31:34 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004", 0x56}], 0x1) 04:31:34 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:34 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffff7f00000000) 04:31:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x2000000000000) 04:31:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n:\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1937.791224][T21706] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1937.791224][T21706] i:0.mC0w[:YH [ 1937.791224][T21706] :<^):4<] [ 1937.827473][T21715] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i 04:31:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7ffffffffffff) [ 1937.827473][T21715] i:0.mC0w[:YH [ 1937.827473][T21715] :<^):4<] [ 1937.851316][T21706] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1937.851316][T21706] LLnCq2] [ 1937.863616][T21715] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1937.863616][T21715] LLnCq2] [ 1937.877626][T21706] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:31:34 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffff00000000) 04:31:34 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004", 0x56}], 0x1) [ 1937.914567][T21715] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1937.934367][T21706] Error parsing options; rc = [-22] 04:31:34 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1937.962058][T21715] Error parsing options; rc = [-22] 04:31:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n\xee\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:31:34 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004", 0x56}], 0x1) [ 1938.233840][T21737] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1938.233840][T21737] i:0.mC0w[:YH [ 1938.233840][T21737] <^):4<] [ 1938.269256][T21737] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1938.269256][T21737] LLnCq2] [ 1938.281211][T21737] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1938.294514][T21737] Error parsing options; rc = [-22] 04:31:40 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:31:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8000000000000) 04:31:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffffffff0700) 04:31:40 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:40 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fc", 0x57}], 0x1) 04:31:40 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xee<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1944.094141][T21755] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1944.094141][T21755] i:0.mC0w[:YH [ 1944.094141][T21755] #<^):4<] 04:31:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x10000000000000) 04:31:40 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fc", 0x57}], 0x1) 04:31:40 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1944.141499][T21755] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1944.141499][T21755] LLnCq2] [ 1944.165953][T21755] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:31:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffffffffff7f) [ 1944.208524][T21759] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1944.208524][T21759] i:0.mC0w[:YH [ 1944.208524][T21759] #<^):4<] [ 1944.240784][T21755] Error parsing options; rc = [-22] [ 1944.249412][T21759] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1944.249412][T21759] LLnCq2] 04:31:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x80000000000000) [ 1944.315932][T21759] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:31:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffffffffffff) [ 1944.368140][T21759] Error parsing options; rc = [-22] 04:31:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:31:46 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fc", 0x57}], 0x1) 04:31:46 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab\t\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:31:46 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf0ffffff0f0000) 04:31:46 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:46 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8a) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:31:46 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:47 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab\\\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:31:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x100000000000000) 04:31:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="20000000e7b4d8352bd55b78ba2fa72da7336ea4a48bf9b27177c892c0df77be6f1e2c702c86c2cbb91771c3f6e4cde08ab6d8916baedb9bf576e9bb9b7f60379bf909f68ddea1529a306939ca8c", @ANYRES16=r3, @ANYBLOB="01000000000000000000010000000900010073797a3000000000"], 0x20}}, 0x0) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000010}, 0x4080) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x30b001) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r7) ioctl$DRM_IOCTL_NEW_CTX(r7, 0x40086425, &(0x7f0000000040)={0x0, 0x3}) pwritev(r4, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1950.540740][T21807] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1950.540740][T21807] i:0.mC0w[:YH [ 1950.540740][T21807] #\^):4<] [ 1950.598818][T21807] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1950.598818][T21807] LLnCq2] [ 1950.628098][T21807] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:31:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x200000000000000) [ 1950.658592][T21813] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1950.658592][T21813] i:0.mC0w[:YH [ 1950.658592][T21813] #\^):4<] [ 1950.724698][T21807] Error parsing options; rc = [-22] 04:31:47 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1950.756140][T21813] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1950.756140][T21813] LLnCq2] [ 1950.788838][T21813] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1950.831211][T21813] Error parsing options; rc = [-22] 04:31:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:31:52 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) write$P9_RXATTRCREATE(r0, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/19, 0xfffffe47) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42800) sendfile(r1, r2, 0x0, 0xffffffff010) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000073797a31000000000000000002000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080073797a310000000000000000000000000000000000030000cf0a000000000000000001000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a2805400039389a804c41c2993fc67e8a146045e14e8a0800550e6a25975bc171f1ff7fa373c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b8838aa36ad24a7dce0973c362bd726a8ab11b0a0b00e77e6c16503cf47ce47302bdd311378eaab7372dab5eef84c31b3cad46a7a0beda0686d2ae4d394286e5c81eae45e3a25ba62b8da11edb578b453acab1d57f25833d4d4c13eef0e0e62be2015eedef3c329833d8a624cea9f3f167faa13a3f01967f021d6e375c3b3cfffbffffffffffff000000000000000031bd6b1dc352e97bc7d5ee9074f3c06415f6cf685cdaa932d48033f2747bb0b8fbec73c462039eceeb261c512c6fefa4f52ecc1faa469f63abb29e6c6154218ab71305b9afe978e20ae45e5bc11469a638d0386de492b48613dda432217b9fdb16bcad7a609969306078ec0c5b6ac963af3fa174fb99eb4e5cf897339cd54b04e441ebbc9afd69d9dffe3d2e585cfbd29e01bed3e6acc64d980bf1dbe805c47e140717e2e4fefcfc711f26b3aad1737d98f5f54e4c10e29cbc9af294be1939202b1fd21dc7a6bb0a0d51b1459c788a25f58aa80e336632252e254c35f0fca0ad3079cfe79572464c22134587932f4572486990628cad05db00dd6aa918b868e6435882318d3c034688fd58aa13db33c63ac6cdd75becaebaaa91f62853954185a19160dc8d3c24840f6e3fe16e78eefc71720cff4ca37897d864097b9a6e8819f1b65356a2a5b94006a8e5899fd60be8297d257ba7dfd70a58b00ef83693ad220cf4917e9b0c4639ae8eb367ce4630207c8d2549930e62a4087ce34c3986fae21f6ddcc6f6e07de8c2919c48a7d06d2af566171d58aaf553440dedc3a83c5bfd70cb39bc875c57c140d69a4b24a48408e8d85f84116c15d337c501e03cb3d68ed0317ac977e46f6af854c3716016caea3633ce115bb8d7f531ce85bde86f347f251bf2b2ccbc4a038cf7436c7044a4c45a505bd7b704b1961f878c3979334b7bd69207d6191c14f490a42326eac11b42014c23b6bb73ba16fa7a0ac3b471ca060df3811b9d646333434afd6236"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 04:31:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab\xee\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:31:52 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x300000000000000) 04:31:52 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:52 executing program 2: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1955.571498][T21833] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1955.571498][T21833] i:0.mC0w[:YH [ 1955.571498][T21833] #^):4<] [ 1955.605737][T21840] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i 04:31:52 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x400000000000000) [ 1955.605737][T21840] i:0.mC0w[:YH [ 1955.605737][T21840] #^):4<] [ 1955.629842][T21833] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1955.629842][T21833] LLnCq2] [ 1955.643782][ T27] audit: type=1804 audit(1585888312.221:187): pid=21834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir262866476/syzkaller.DCorQm/584/bus" dev="sda1" ino=17039 res=1 [ 1955.679529][T21840] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1955.679529][T21840] LLnCq2] [ 1955.699435][T19277] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 1955.712087][ T27] audit: type=1804 audit(1585888312.281:188): pid=21834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir262866476/syzkaller.DCorQm/584/bus" dev="sda1" ino=17039 res=1 [ 1955.738748][T21833] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1955.768599][T19277] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on %z5 04:31:52 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x500000000000000) [ 1955.781747][T21840] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1955.802609][ T27] audit: type=1804 audit(1585888312.341:189): pid=21845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir262866476/syzkaller.DCorQm/584/bus" dev="sda1" ino=17039 res=1 [ 1955.829943][T21833] Error parsing options; rc = [-22] [ 1955.835275][T21840] Error parsing options; rc = [-22] 04:31:52 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5\xee\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1955.870488][ T27] audit: type=1804 audit(1585888312.441:190): pid=21834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir262866476/syzkaller.DCorQm/584/bus" dev="sda1" ino=17039 res=1 [ 1955.917935][T19277] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max 04:31:52 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:52 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x600000000000000) [ 1955.983662][T19277] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1956.008770][ T27] audit: type=1804 audit(1585888312.511:191): pid=21834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir262866476/syzkaller.DCorQm/584/bus" dev="sda1" ino=17039 res=1 [ 1956.105419][T21860] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1956.105419][T21860] i:0.mC0w[:YH [ 1956.105419][T21860] #<):4<] [ 1956.134898][ T27] audit: type=1804 audit(1585888312.551:192): pid=21850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir262866476/syzkaller.DCorQm/584/bus" dev="sda1" ino=17039 res=1 [ 1956.170498][T21860] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1956.170498][T21860] LLnCq2] [ 1956.184142][T21860] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1956.219103][T21860] Error parsing options; rc = [-22] 04:31:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:31:58 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x1404, 0x113, 0x70bd25, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x4010}, 0x8801) close(r3) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1406, 0x10, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x8b) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:31:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x800000000000000) 04:31:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:31:58 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) r1 = openat(r0, &(0x7f0000000580)='./file0\x00', 0x8800, 0x1c) r2 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0x18) r4 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000005c0)={r3, 0x20, 0xf02, 0xf5a2, 0x9, 0xf000, 0x7f, 0x20, {r5, @in6={{0xa, 0x4e23, 0x7fffffff, @mcast1, 0x7ff}}, 0x5, 0x0, 0x5, 0x6, 0x10000000}}, &(0x7f0000000680)=0xb0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000006c0)={0x3f, "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"}) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xb, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000200)="3fef0bb7360a532bbf9d27e45b5c4d80f34efe2db65819c7fd0d4d5104efd8f7692a32fd0854efd97ed2a2f0da7949d9b79dfa0359bfa19f", 0x38, 0x7}, {&(0x7f0000000240)="1987a7783a05c6df6b0db0e546f18fde42103d80132b5a83b165689277216283c3539ce78b2ffadcc969d97c755211f2b0", 0x31, 0xfffffffffffff001}, {&(0x7f0000000280)="c0cf7683afa8e52edac4d73aac107298533870cd603099ed4219af5a6661899ef76aae3cac2cb7739c05094e915a25496d8a49c6e6653eb94c9c6b66056a3531f948f2302ac09468ead08896554702048a96c44b153720fa36cdc6914adf35ed804386", 0x63, 0x7}, {&(0x7f0000000300)="a82b5c27ac635d2a7a6df88c3a5947665ab143a70911dfc87b59849e64afe8a6d1949cf6631eada3018fd231af401ee9b7d1d82da30646f9ca3fec95f7a8e5d6f9867dba9cf57368d864f72249ee2ef5a024f7606d777becc4b4eed212d9031a00ea3cfb17d96fa6ba2f08693f1e330a1d868045526b8aa2fc8e885e6be3d3c033d79a383f3b4d6c8217ec08d9d087b9a68a8b27c4f0c63caf94", 0x9a, 0x8350}], 0x8, &(0x7f0000000900)=ANY=[@ANYBLOB="7377616c6c6f632c75716e6f656e666f7263652c6e6f626172726965722c6e6f71756f74612c66736d616769633d3078303030303030303030303030303661652c7365636c6162656c2c6f626a5f726f6c653db3dffa7acf4d66a31c966180c734c02b9121f477f955a4445427c1b32a25498e830320883320c61e796d06f3bcf9949cdcc4a719ad6c5f70669d2fae1a6980a08beb0ad3698d3ac2043096f01186b82ea7046d433077885b3a59f248f50a23ab3cd55efd29a03ac7e2c5f5343ca1de192cbbd1c7fefadbb3ae736d821359b28eec0a4cb74c6eff4371322c736d61636b66736861743d6563727970746673002c66736d616769633d3078303030303030303030303030306466642c657569643d", @ANYRESDEC=r7, @ANYBLOB="2c003dd4939f5c2723827befdd144b25ea3ee196615f2571ea0ac5f1cb3a3f52bd17e6e0451ae07853f61f0cbc0b9efc627a0c230f39e8e6d3581b2e1a0daf61f93ae7c10c"]) 04:31:58 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\x18Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1961.827930][T21877] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1961.827930][T21877] i:0.mC0w[YH [ 1961.827930][T21877] #<^):4<] 04:31:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x804000000000000) [ 1961.907431][T21882] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1961.907431][T21882] i:0.mC0w[:YH [ 1961.907431][T21882] #<^):4<] [ 1961.908790][T21877] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1961.908790][T21877] LLnCq2] [ 1962.019257][T21882] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1962.019257][T21882] LLnCq2] [ 1962.019469][T21877] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:31:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1962.088677][T21882] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1962.103164][T21877] Error parsing options; rc = [-22] 04:31:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x900000000000000) 04:31:58 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0xf, 0x6, 0x801, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x4000) [ 1962.143135][T21882] Error parsing options; rc = [-22] [ 1962.213517][T21904] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1962.213517][T21904] i:0.mC0w[:YH [ 1962.213517][T21904] #<^):4<] 04:31:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1962.277946][T21909] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1962.277946][T21909] i:0.mC0w[:YH [ 1962.277946][T21909] #<^):4<] [ 1962.369165][T21904] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1962.369165][T21904] LLnCq2] [ 1962.390875][T21909] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1962.390875][T21909] LLnCq2] 04:31:59 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xc00000000000000) [ 1962.412618][T21904] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1962.424441][T21909] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1962.486598][T21904] Error parsing options; rc = [-22] [ 1962.579779][T21909] Error parsing options; rc = [-22] 04:32:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:32:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:06 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xd00000000000000) 04:32:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:06 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x200, 0x0) close(r0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/246, 0xf6) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)=0x0) r3 = socket(0x41, 0x2, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r6, r4, r5) fchown(r1, r2, r5) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:06 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x43, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r3, &(0x7f00000001c0)='s', 0xffcf) r4 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r6 = syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYRES16=r6, @ANYBLOB="080027bd7000fedbdf25040000003c00048005000300000000000500030007000000050003000000000005000300070000000500030002ff07000500030005000000050003000700b641e518c236d85dcd00801c000005000000050003000000"], 0x2}, 0x1, 0x0, 0x0, 0x2}, 0x20000000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x84, r6, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x70, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6de7471e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4987f022}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x763b43c7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3ab2f5b2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xeb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x54}, 0x44011) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x1c, r6, 0x61c, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x130, r6, 0x8, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xd4, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a5a6317}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x70}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd0}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xfda052f}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x754cb3a1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5e8d0bbb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1373a4e7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc698672}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x45}]}, {0x4}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77ee27d5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xac}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75c26da2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe0d646c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x37}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x92}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70b9b368}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x42929e8e}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51aa5006}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x547862f1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x668d560f}]}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x4000}, 0x20000008) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000000)={r5, 0x2, "1eb4"}, &(0x7f0000000040)=0xa) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r7, 0xf000, 0x2, [0x9, 0x4]}, 0xc) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:32:06 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1100000000000000) [ 1970.163007][T21935] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1970.163007][T21935] i:0.mC0w[:YH [ 1970.163007][T21935] #<^):4<] 04:32:06 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1200000000000000) [ 1970.309779][T21935] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1970.309779][T21935] LLnCq2] 04:32:06 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1300000000000000) 04:32:07 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x22c, 0x0, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x6}, [@CTA_EXPECT_NAT={0x1a4, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x8}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @remote}}}]}, @CTA_EXPECT_NAT_TUPLE={0xc4, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0xa8}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr="0a64dc23ce21118f83e1e8fc07478f5d"}}}]}, @CTA_EXPECT_NAT_TUPLE={0x68, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x43}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_TUPLE={0x14, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xa6f}]}, 0x22c}, 0x1, 0x0, 0x0, 0x800}, 0x20004000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8201, 0x0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x2, 0x1, 0x7}}, 0x30) fcntl$notify(r1, 0x402, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1970.390681][T21935] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:32:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1970.496532][T21935] Error parsing options; rc = [-22] 04:32:07 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1500000000000000) [ 1970.561694][T21935] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1970.561694][T21935] i:0.mC0w[:YH [ 1970.561694][T21935] #<^):4<] [ 1970.643581][T21935] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1970.643581][T21935] LLnCq2] [ 1970.711616][T21935] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1970.767098][T21935] Error parsing options; rc = [-22] 04:32:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:32:15 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f0000000000)={0x81, 0x7f}) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000040)="229ed34beb3867e0608bb3f5f8f0b8cb52fbd1d7a27aedfe91a39de627505e329afe1f9279cd77beb682848f28f839c71ff97bf3778b8e49c5b84d1b089a01c4035678e6153a44b70950e3b41462cfa89e00fe12380aebfead898969150a518f3e746379de252ab786d6bd", 0x6b}], 0x1, 0x0) 04:32:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:15 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3f, 0x8001) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f0000000400)={0x7826c975, [[0xff, 0x2, 0x401, 0xfe9a, 0x5, 0x3ff, 0x80000000, 0x8], [0x2f0, 0xfffffff9, 0x0, 0x4, 0x8, 0xffffffff, 0x7, 0xfff], [0x7b6, 0xea5f, 0x80000001, 0x3ff, 0x9, 0xdb5a, 0x7, 0x3ff]], [], [{0x10000, 0x250, 0x1, 0x0, 0x1, 0x1}, {0x70e2, 0x20, 0x1, 0x0, 0x0, 0x1}, {0xff, 0x5, 0x1, 0x0, 0x1, 0x1}, {0xfffffffc, 0x7, 0x1, 0x1}, {0xea, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x9, 0x101, 0x0, 0x1, 0x1}, {0x800, 0x8, 0x0, 0x1, 0x1}, {0x75d6, 0x1f, 0x0, 0x1}, {0x9, 0x5, 0x0, 0x1, 0x1, 0x1}, {0x6, 0x0, 0x1}, {0xffff0001, 0x0, 0x1}, {0x7ff, 0x9}], [], 0xffffffff}) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:15 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x1f00000000000000) 04:32:15 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x200, 0x0) close(r0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/246, 0xf6) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)=0x0) r3 = socket(0x41, 0x2, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r6, r4, r5) fchown(r1, r2, r5) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:16 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x3f00000000000000) [ 1979.483224][T21976] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1979.483224][T21976] i:0.mC0w[:YH [ 1979.483224][T21976] #<^):4<] [ 1979.508310][T21976] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1979.508310][T21976] LLnCq2] [ 1979.534569][T21977] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1979.534569][T21977] i:0.mC0w[:YH [ 1979.534569][T21977] #<^):4<] 04:32:16 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x1014c1, 0x10a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000003040)="10", 0x1}], 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x9], 0x1, 0x80800}) [ 1979.612540][T21978] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1979.612540][T21978] i:0.mC0w[:YH [ 1979.612540][T21978] #<^):4<] [ 1979.616751][T21976] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:32:16 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x4000000000000000) [ 1979.668823][T21977] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1979.668823][T21977] LLnCq2] [ 1979.694005][T21977] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1979.712433][T21976] Error parsing options; rc = [-22] 04:32:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:16 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000040), 0x4) [ 1979.717709][T21978] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1979.717709][T21978] LLnCq2] [ 1979.735012][T21978] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1979.748298][T21977] Error parsing options; rc = [-22] [ 1979.763148][T21978] Error parsing options; rc = [-22] 04:32:16 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1979.871142][T21995] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1979.871142][T21995] i:0.mC0w[:YH [ 1979.871142][T21995] #<^):4<] [ 1979.932800][T21998] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1979.932800][T21998] i:0.mC0w[:YH [ 1979.932800][T21998] #<^):4<] [ 1979.991915][T21995] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1979.991915][T21995] LLnCq2] [ 1980.012593][T21998] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1980.012593][T21998] LLnCq2] [ 1980.028026][T21995] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1980.058824][T21998] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1980.092886][T21998] Error parsing options; rc = [-22] [ 1980.093365][T21995] Error parsing options; rc = [-22] 04:32:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:32:25 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x200, 0x0) close(r0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/246, 0xf6) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)=0x0) r3 = socket(0x41, 0x2, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r6, r4, r5) fchown(r1, r2, r5) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:25 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x7fffffffffffffff) 04:32:25 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x400, 0x0, 0x25dfdbfb, {}, [""]}, 0x1c}}, 0x20000010) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) 04:32:25 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:25 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\rY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1988.750558][T22016] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1988.750558][T22016] i:0.mC0w[:YH [ 1988.750558][T22016] #<^):4<] [ 1988.759952][T22020] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1988.759952][T22020] i:0.mC0w[:YH [ 1988.759952][T22020] #<^):4<] [ 1988.797259][T22016] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1988.797259][T22016] LLnCq2] [ 1988.807836][T22022] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1988.807836][T22022] i:0.mC0w[ YH [ 1988.807836][T22022] #<^):4<] [ 1988.816361][T22020] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1988.816361][T22020] LLnCq2] 04:32:25 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x8000000000000000) [ 1988.853283][T22016] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1988.876325][T22020] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1988.888800][T22022] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1988.888800][T22022] LLnCq2] 04:32:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x541c00, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1988.892315][T22016] Error parsing options; rc = [-22] [ 1988.935641][T22022] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1988.963184][T22023] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1988.963184][T22023] i:0.mC0w[:YH [ 1988.963184][T22023] #<^):4<] 04:32:25 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xe34d020000000000) 04:32:25 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x200, 0x0) close(r0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/246, 0xf6) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)=0x0) r3 = socket(0x41, 0x2, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r6, r4, r5) fchown(r1, r2, r5) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:25 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[\fY\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1988.964739][T22022] Error parsing options; rc = [-22] [ 1988.989894][T22020] Error parsing options; rc = [-22] [ 1989.015612][T22023] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1989.015612][T22023] LLnCq2] [ 1989.058011][T22023] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:32:25 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000100)={0x81, 0x40, &(0x7f0000000000)="7a5cfa5e5bad6c47bc7b133d3ad3a793bb5972bcee0cef71e487c9bc47fddcc0ecaa841a56efc218d95c87857eef95801cdd2652657740864faaaf1552f7be935c09c020cac3c6915d32fb4e16bcaa5f1c7a15ee5a8a0dce902edccb7a711b3020cab88778a71a220948905e9c3598e136f1f285eb82b47fbf33e92854ebd2bcd04a793f67d47b80c39d7561ec2a9016ae475a4ef8a84f21eb39308f6e30b20a5f53f143bf1b5060de84ff0c38b0528808946705340275de19351c09dc8cff6d9713e73df1e2ac5bfa23885cca8899c10465bad2e5748fcc1c921f0cfab1ac44e78d", {0x401, 0x80000000, 0x34424752, 0x4, 0x893, 0x16, 0x4, 0xffff}}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) accept$unix(r3, &(0x7f0000000200)=@abs, &(0x7f0000000140)=0x6e) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000003040)="02", 0x1}, {&(0x7f00000001c0)="d9cbb771152dcd09cb6f0c49bbcedebbdd33cb0640a742d22a53890bd30b7740e858d1c4dafe638f1bdc536538d96500"/57, 0x39}], 0x2, 0x5) [ 1989.099118][T22023] Error parsing options; rc = [-22] [ 1989.154104][T22044] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1989.154104][T22044] i:0.mC0w[ YH [ 1989.154104][T22044] #<^):4<] [ 1989.217553][T22044] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1989.217553][T22044] LLnCq2] [ 1989.247413][T22044] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1989.260911][T22047] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1989.260911][T22047] i:0.mC0w[:YH [ 1989.260911][T22047] #<^):4<] [ 1989.269112][T22044] Error parsing options; rc = [-22] [ 1989.282487][T22047] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1989.282487][T22047] LLnCq2] [ 1989.299508][T22047] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1989.313019][T22047] Error parsing options; rc = [-22] 04:32:33 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xe4ffffff00000000) 04:32:33 executing program 5: r0 = socket(0x23, 0x2, 0x200) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:33 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x12) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000240)='memory.events\x00'}, 0x30) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000015980)={&(0x7f0000014580)=@xdp, 0x80, &(0x7f0000014900)=[{0x0}], 0x1, &(0x7f0000014980)=""/4096, 0x1000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x4}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000380)={0xfc80c9dcbc7ebf3f, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000b, 0x0, 0x0, 0x6, 0x0, 0xbb}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480), 0x4) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff051805001201", 0x2e}], 0x1}, 0x0) 04:32:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:32:33 executing program 2 (fault-call:3 fault-nth:0): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:33 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x111042, 0x15) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x100000000009) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1997.022850][T22062] FAULT_INJECTION: forcing a failure. [ 1997.022850][T22062] name failslab, interval 1, probability 0, space 0, times 0 [ 1997.027429][T22069] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1997.044678][T22062] CPU: 0 PID: 22062 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1997.053557][T22062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1997.055713][T22066] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1997.055713][T22066] i:0.mC0w[:YH [ 1997.055713][T22066] #<^):4<] [ 1997.063766][T22062] Call Trace: [ 1997.063887][T22062] dump_stack+0x11d/0x187 [ 1997.092461][T22062] should_fail.cold+0x5/0xf [ 1997.097049][T22062] __should_failslab+0x82/0xb0 [ 1997.101821][T22062] should_failslab+0x5/0xf [ 1997.106287][T22062] kmem_cache_alloc_node+0x35/0x680 [ 1997.110197][T22066] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1997.110197][T22066] LLnCq2] [ 1997.111602][T22062] __alloc_skb+0x8d/0x360 [ 1997.111691][T22062] netlink_sendmsg+0x662/0x8a0 [ 1997.132146][T22062] ? netlink_unicast+0x4c0/0x4c0 [ 1997.137142][T22062] sock_sendmsg+0x98/0xc0 [ 1997.141518][T22062] sock_write_iter+0x186/0x240 [ 1997.146308][T22062] do_iter_readv_writev+0x4a7/0x5d0 [ 1997.148867][T22066] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1997.151550][T22062] do_iter_write+0x137/0x3a0 [ 1997.151605][T22062] vfs_writev+0x118/0x1c0 [ 1997.171821][T22066] Error parsing options; rc = [-22] [ 1997.173564][T22062] ? __fget_light+0xc0/0x1a0 [ 1997.180281][T22075] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1997.180281][T22075] i:0.mC0w[:YH [ 1997.180281][T22075] #<^):4<] [ 1997.183401][T22062] do_writev+0x203/0x240 [ 1997.183471][T22062] ? debug_smp_processor_id+0x3f/0x129 [ 1997.205070][T22075] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY 04:32:33 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf4ffffff00000000) [ 1997.205070][T22075] LLnCq2] [ 1997.208773][T22062] __x64_sys_writev+0x4b/0x60 [ 1997.208804][T22062] do_syscall_64+0xc7/0x390 [ 1997.208909][T22062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1997.214452][T22075] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1997.225831][T22062] RIP: 0033:0x45c849 04:32:33 executing program 2 (fault-call:3 fault-nth:1): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1997.225902][T22062] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1997.225955][T22062] RSP: 002b:00007f6090e34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1997.230757][T22075] Error parsing options; rc = [-22] [ 1997.235093][T22062] RAX: ffffffffffffffda RBX: 00007f6090e356d4 RCX: 000000000045c849 [ 1997.235103][T22062] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1997.235113][T22062] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1997.235124][T22062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1997.235134][T22062] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000000 [ 1997.334171][T22073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1997.341265][T22073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1997.353441][T22073] device bridge0 entered promiscuous mode 04:32:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xf5ffffff00000000) 04:32:34 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x541042, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0xfff, 0x131000) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000080), 0x0, 0x8) [ 1997.430967][T22085] FAULT_INJECTION: forcing a failure. [ 1997.430967][T22085] name failslab, interval 1, probability 0, space 0, times 0 [ 1997.473289][T22085] CPU: 1 PID: 22085 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1997.482054][T22085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1997.492109][T22085] Call Trace: [ 1997.495412][T22085] dump_stack+0x11d/0x187 [ 1997.499756][T22085] should_fail.cold+0x5/0xf [ 1997.504276][T22085] __should_failslab+0x82/0xb0 [ 1997.509179][T22085] should_failslab+0x5/0xf [ 1997.513637][T22085] kmem_cache_alloc_node_trace+0x37/0x610 [ 1997.519397][T22085] ? memcg_kmem_put_cache+0x77/0xc0 [ 1997.524602][T22085] ? debug_smp_processor_id+0x3f/0x129 [ 1997.530118][T22085] ? kmem_cache_alloc_node+0x1bb/0x680 [ 1997.535590][T22085] __kmalloc_reserve.isra.0+0x43/0xd0 [ 1997.541044][T22085] __alloc_skb+0xbe/0x360 [ 1997.545410][T22085] netlink_sendmsg+0x662/0x8a0 [ 1997.550270][T22085] ? netlink_unicast+0x4c0/0x4c0 [ 1997.555218][T22085] sock_sendmsg+0x98/0xc0 [ 1997.559562][T22085] sock_write_iter+0x186/0x240 [ 1997.564375][T22085] do_iter_readv_writev+0x4a7/0x5d0 04:32:34 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="14", 0x1}], 0x1, 0x0) [ 1997.569598][T22085] do_iter_write+0x137/0x3a0 [ 1997.574210][T22085] vfs_writev+0x118/0x1c0 [ 1997.578566][T22085] ? __fget_light+0xc0/0x1a0 [ 1997.583309][T22085] do_writev+0x203/0x240 [ 1997.587632][T22085] ? ksys_write+0x133/0x1a0 [ 1997.592225][T22085] __x64_sys_writev+0x4b/0x60 [ 1997.596919][T22085] do_syscall_64+0xc7/0x390 [ 1997.601522][T22085] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1997.607415][T22085] RIP: 0033:0x45c849 04:32:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000380)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000480), 0x6000) r8 = socket(0x41, 0x2, 0x6) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r11, r9, r10) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="020000000100020000000000020004009d11e2bb6d17fa1c2ed64899390301cef07735efa1b4f9a9", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="080000002a44783a8c2ee47954dc14", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=r0, @ANYBLOB="02000000", @ANYRES32=r2, @ANYBLOB="02ff44009bd6098d13c46959b10a1f8d50226fd29f977c53b580a7a99828faf798dfd1b33138528cfbbcee23e44149adf8ec1dbc225e5ea4f0bf07ac412b9f200a9a0a7f850daacb9fcb8b18329bc1a33176bf190e8c8c716fa893ca20f7b4aa3030a45a3a17b390cc3b2c91d2ac700c8693c3adbb94df947777fe35cc6ebf775e", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="040002000000000008000400", @ANYRES32, @ANYBLOB="c10100010000", @ANYRES32=r10, @ANYBLOB="10000100000000002000050000000000"], 0x19, 0x3) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x112c001, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 1997.611437][T22085] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1997.631044][T22085] RSP: 002b:00007f6090e34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1997.639464][T22085] RAX: ffffffffffffffda RBX: 00007f6090e356d4 RCX: 000000000045c849 [ 1997.647437][T22085] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1997.655460][T22085] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1997.663431][T22085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 04:32:34 executing program 0 (fault-call:3 fault-nth:0): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 1997.671403][T22085] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000001 04:32:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x200001, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000200)) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) 04:32:34 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfbffffff00000000) [ 1997.834573][T22107] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1997.834573][T22107] i:0.mC0w[:YH [ 1997.834573][T22107] #<^):4<] [ 1997.887516][T22105] FAULT_INJECTION: forcing a failure. [ 1997.887516][T22105] name failslab, interval 1, probability 0, space 0, times 0 [ 1997.936082][T22105] CPU: 0 PID: 22105 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 1997.944813][T22105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1997.954917][T22105] Call Trace: [ 1997.958214][T22105] dump_stack+0x11d/0x187 [ 1997.962555][T22105] should_fail.cold+0x5/0xf [ 1997.965640][T22116] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 1997.965640][T22116] i:0.mC0w[:YH [ 1997.965640][T22116] #<^):4<] [ 1997.967072][T22105] __should_failslab+0x82/0xb0 [ 1997.993035][T22105] should_failslab+0x5/0xf [ 1997.997449][T22105] kmem_cache_alloc_node+0x35/0x680 [ 1998.002667][T22105] __alloc_skb+0x8d/0x360 [ 1998.007009][T22105] netlink_sendmsg+0x662/0x8a0 [ 1998.011822][T22105] ? netlink_unicast+0x4c0/0x4c0 [ 1998.015120][T22107] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1998.015120][T22107] LLnCq2] [ 1998.016769][T22105] sock_sendmsg+0x98/0xc0 [ 1998.016799][T22105] sock_write_iter+0x186/0x240 [ 1998.028437][T22116] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 1998.028437][T22116] LLnCq2] [ 1998.032700][T22105] do_iter_readv_writev+0x4a7/0x5d0 [ 1998.032791][T22105] do_iter_write+0x137/0x3a0 [ 1998.037539][T22116] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1998.048988][T22105] vfs_writev+0x118/0x1c0 [ 1998.049039][T22105] ? __fget_light+0xc0/0x1a0 [ 1998.054331][T22107] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1998.058797][T22105] do_writev+0x203/0x240 [ 1998.058821][T22105] __x64_sys_writev+0x4b/0x60 [ 1998.058847][T22105] do_syscall_64+0xc7/0x390 [ 1998.058873][T22105] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1998.058895][T22105] RIP: 0033:0x45c849 [ 1998.071961][T22116] Error parsing options; rc = [-22] [ 1998.076251][T22105] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1998.076273][T22105] RSP: 002b:00007f074b93fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1998.080957][T22107] Error parsing options; rc = [-22] [ 1998.093830][T22105] RAX: ffffffffffffffda RBX: 00007f074b9406d4 RCX: 000000000045c849 [ 1998.093841][T22105] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 1998.093852][T22105] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1998.093871][T22105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1998.187244][T22105] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000000 04:32:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:32:40 executing program 2 (fault-call:3 fault-nth:2): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x1c1042, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/48, 0x30}, {&(0x7f0000000140)=""/17, 0x11}], 0x3) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x6, 0x2000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000000)=r3) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x2) r4 = dup(r1) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:32:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xfeffffff00000000) 04:32:40 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x200, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffffc, 0x0) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x5) llistxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/206, 0xce) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000002c0)={0x9b0000, 0x10000, 0x80, r0, 0x0, &(0x7f0000000280)={0x9f0901, 0x10001, [], @p_u8=&(0x7f0000000240)=0x4}}) sendmsg$nl_netfilter(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0xa, 0x2, 0x101, 0x70bd27, 0x25dfdbff, {0x1, 0x0, 0x4}, [@typed={0xc, 0x2b, 0x0, 0x0, @u64=0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4804}, 0x4000051) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:32:40 executing program 0 (fault-call:3 fault-nth:1): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2004.192147][T22130] FAULT_INJECTION: forcing a failure. [ 2004.192147][T22130] name failslab, interval 1, probability 0, space 0, times 0 [ 2004.216978][T22128] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2004.216978][T22128] i:0.mC0w[:YH [ 2004.216978][T22128] #<^):4<] [ 2004.248549][T22132] FAULT_INJECTION: forcing a failure. [ 2004.248549][T22132] name failslab, interval 1, probability 0, space 0, times 0 [ 2004.261015][T22130] CPU: 1 PID: 22130 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2004.269974][T22130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2004.280137][T22130] Call Trace: [ 2004.283447][T22130] dump_stack+0x11d/0x187 [ 2004.287788][T22130] should_fail.cold+0x5/0xf [ 2004.292377][T22130] __should_failslab+0x82/0xb0 [ 2004.297165][T22130] should_failslab+0x5/0xf [ 2004.301679][T22130] kmem_cache_alloc_node_trace+0x37/0x610 [ 2004.307415][T22130] ? memcg_kmem_put_cache+0x77/0xc0 [ 2004.312624][T22130] ? debug_smp_processor_id+0x3f/0x129 [ 2004.318098][T22130] ? kmem_cache_alloc_node+0x1bb/0x680 [ 2004.323569][T22130] __kmalloc_reserve.isra.0+0x43/0xd0 [ 2004.328959][T22130] __alloc_skb+0xbe/0x360 [ 2004.333303][T22130] netlink_sendmsg+0x662/0x8a0 [ 2004.338106][T22130] ? netlink_unicast+0x4c0/0x4c0 [ 2004.343051][T22130] sock_sendmsg+0x98/0xc0 [ 2004.347389][T22130] sock_write_iter+0x186/0x240 [ 2004.352170][T22130] do_iter_readv_writev+0x4a7/0x5d0 [ 2004.357382][T22130] do_iter_write+0x137/0x3a0 [ 2004.361983][T22130] vfs_writev+0x118/0x1c0 [ 2004.366330][T22130] ? __fget_light+0xc0/0x1a0 [ 2004.370927][T22130] do_writev+0x203/0x240 [ 2004.375176][T22130] ? ksys_write+0x133/0x1a0 [ 2004.379787][T22130] __x64_sys_writev+0x4b/0x60 [ 2004.384484][T22130] do_syscall_64+0xc7/0x390 [ 2004.389048][T22130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2004.395008][T22130] RIP: 0033:0x45c849 [ 2004.398909][T22130] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2004.418517][T22130] RSP: 002b:00007f074b93fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2004.426986][T22130] RAX: ffffffffffffffda RBX: 00007f074b9406d4 RCX: 000000000045c849 [ 2004.434949][T22130] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 04:32:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x1a001, 0x31) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 2004.442915][T22130] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2004.450893][T22130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2004.458862][T22130] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000001 [ 2004.466970][T22132] CPU: 0 PID: 22132 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 2004.475643][T22132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2004.485788][T22132] Call Trace: [ 2004.489081][T22132] dump_stack+0x11d/0x187 [ 2004.493415][T22132] should_fail.cold+0x5/0xf [ 2004.498000][T22132] __should_failslab+0x82/0xb0 [ 2004.502790][T22132] should_failslab+0x5/0xf [ 2004.507238][T22132] kmem_cache_alloc+0x23/0x5e0 [ 2004.512007][T22132] ? skb_clone+0xaf/0x280 [ 2004.516352][T22132] skb_clone+0xf4/0x280 [ 2004.520565][T22132] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2004.526473][T22132] netlink_deliver_tap+0x45a/0x4d0 [ 2004.531640][T22132] netlink_unicast+0x41f/0x4c0 [ 2004.532992][T22128] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2004.532992][T22128] LLnCq2] 04:32:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff01000000000000) [ 2004.536448][T22132] netlink_sendmsg+0x4cf/0x8a0 [ 2004.536479][T22132] ? netlink_unicast+0x4c0/0x4c0 [ 2004.557588][T22132] sock_sendmsg+0x98/0xc0 [ 2004.561932][T22132] sock_write_iter+0x186/0x240 [ 2004.566714][T22132] do_iter_readv_writev+0x4a7/0x5d0 [ 2004.571925][T22132] do_iter_write+0x137/0x3a0 [ 2004.576530][T22132] vfs_writev+0x118/0x1c0 [ 2004.580879][T22132] ? __fget_light+0xc0/0x1a0 [ 2004.582992][T22140] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i 04:32:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xff0f000000000000) [ 2004.582992][T22140] i:0.mC0w[:YH [ 2004.582992][T22140] #<^):4<] [ 2004.585504][T22132] do_writev+0x203/0x240 [ 2004.585536][T22132] ? debug_smp_processor_id+0x3f/0x129 [ 2004.616283][T22132] __x64_sys_writev+0x4b/0x60 [ 2004.620977][T22132] do_syscall_64+0xc7/0x390 [ 2004.625547][T22132] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2004.631439][T22132] RIP: 0033:0x45c849 [ 2004.635351][T22132] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2004.649819][T22128] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2004.654972][T22132] RSP: 002b:00007f6090e34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2004.676500][T22132] RAX: ffffffffffffffda RBX: 00007f6090e356d4 RCX: 000000000045c849 [ 2004.684470][T22132] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2004.692442][T22132] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 04:32:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000000)={{0x62, @remote, 0x4e23, 0x2, 'nq\x00', 0x0, 0x9, 0x61}, {@local, 0x4e24, 0x4, 0x3, 0x81, 0xe488}}, 0x44) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 2004.694315][T22140] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2004.694315][T22140] LLnCq2] [ 2004.700412][T22132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2004.700423][T22132] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000002 04:32:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffefffff00000000) [ 2004.764182][T22128] Error parsing options; rc = [-22] [ 2004.780557][T22140] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2004.808767][T22140] Error parsing options; rc = [-22] [ 2004.896263][T22155] IPVS: set_ctl: invalid protocol: 98 172.20.20.187:20003 04:32:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffff7f00000000) [ 2005.035671][T22157] IPVS: set_ctl: invalid protocol: 98 172.20.20.187:20003 04:32:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:32:47 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='\x00', 0x1400) syz_open_procfs(0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000002c0)={0x1, 0x0, {}, {r3}, 0x1ff, 0xfffffffffffffffa}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x20000, &(0x7f0000000900)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,afid=0x0000000000000007,dfltuid=', @ANYRESHEX, @ANYBLOB=',access=', @ANYRES64, @ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB=',smackfshat=ecryptfs\x00,pcr=00000000000000000000,\x00']) 04:32:47 executing program 0 (fault-call:3 fault-nth:2): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:47 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffff00000000) 04:32:47 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141040, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$DRM_IOCTL_MODE_DIRTYFB(r3, 0xc01864b1, &(0x7f0000000140)={0x5, 0x2, 0xffffff00, 0x0, &(0x7f0000000100)}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x3) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 2011.435471][T22168] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2011.435471][T22168] i:0.mC0w[:YH [ 2011.435471][T22168] #<^):4<] [ 2011.469746][T22174] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2011.469746][T22174] i:0.mC0w[:YH [ 2011.469746][T22174] #<^):4<] [ 2011.497079][T22168] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2011.497079][T22168] LLnCq2] [ 2011.520928][T22174] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2011.520928][T22174] LLnCq2] [ 2011.535148][T22168] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2011.548583][T22174] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2011.569401][T22178] FAULT_INJECTION: forcing a failure. [ 2011.569401][T22178] name failslab, interval 1, probability 0, space 0, times 0 04:32:48 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x541942, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 2011.595295][T22168] Error parsing options; rc = [-22] [ 2011.612457][T22174] Error parsing options; rc = [-22] [ 2011.647427][T22178] CPU: 1 PID: 22178 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2011.656145][T22178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2011.666196][T22178] Call Trace: [ 2011.669494][T22178] dump_stack+0x11d/0x187 [ 2011.673860][T22178] should_fail.cold+0x5/0xf [ 2011.678399][T22178] __should_failslab+0x82/0xb0 [ 2011.683174][T22178] should_failslab+0x5/0xf [ 2011.687592][T22178] kmem_cache_alloc+0x23/0x5e0 [ 2011.692379][T22178] ? should_fail+0x7c/0x2fd [ 2011.696887][T22178] ? up_write+0x59/0x80 [ 2011.701063][T22178] skb_clone+0xf4/0x280 [ 2011.705234][T22178] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2011.711141][T22178] netlink_deliver_tap+0x45a/0x4d0 [ 2011.716267][T22178] netlink_unicast+0x41f/0x4c0 [ 2011.721064][T22178] netlink_sendmsg+0x4cf/0x8a0 [ 2011.725852][T22178] ? netlink_unicast+0x4c0/0x4c0 [ 2011.730796][T22178] sock_sendmsg+0x98/0xc0 [ 2011.735136][T22178] sock_write_iter+0x186/0x240 [ 2011.739921][T22178] do_iter_readv_writev+0x4a7/0x5d0 [ 2011.745142][T22178] do_iter_write+0x137/0x3a0 [ 2011.749775][T22178] vfs_writev+0x118/0x1c0 [ 2011.754176][T22178] ? __fget_light+0xc0/0x1a0 [ 2011.758782][T22178] do_writev+0x203/0x240 [ 2011.763125][T22178] ? ksys_write+0x133/0x1a0 [ 2011.767734][T22178] __x64_sys_writev+0x4b/0x60 [ 2011.772428][T22178] do_syscall_64+0xc7/0x390 [ 2011.776946][T22178] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2011.782874][T22178] RIP: 0033:0x45c849 [ 2011.786854][T22178] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2011.806461][T22178] RSP: 002b:00007f074b93fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2011.814892][T22178] RAX: ffffffffffffffda RBX: 00007f074b9406d4 RCX: 000000000045c849 [ 2011.822865][T22178] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2011.830839][T22178] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2011.838811][T22178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 04:32:48 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="0f0000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:48 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffffffff0700) 04:32:48 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x100, 0x1) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200)="2225fce48d5e4aec59a33e697591759bbf87bce91ab0702ae64ee234fc781d187230220114e9a38de3487f7af4453d4b84257f64bc9078f01a65e097b92b43bde6737d5dfa5ba2f08f11d36866964ccd0af99ad92c8e02be6df38a9828a38dfec39d4108df", &(0x7f0000000280)="431250a95443d2279273a68a17e6aede79c141c0fbf3e48731d2ccf8519ffbf284b3f0cadb21491876dcbff6ba4272158e555eed5f67cd4ee289773acd6c9524e647b149974d3644401bcb204f0ff269c2c0fe64411d49097034665ce11d79d004c76d0692c8c72c605c6cd5ca5498245ebf4017bc81d1e90d42c49d12124271807f4d4d1edc5541a64d", 0x2}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x200000, 0x0) r2 = socket$inet(0x2, 0x0, 0x84) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) write$FUSE_INIT(r3, &(0x7f0000000340)={0x50, 0x0, 0x2, {0x7, 0x1f, 0x7, 0x2002060, 0x2, 0x0, 0x4280, 0x5}}, 0x50) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={r4, 0x0, 0x9, 0x8, 0x6, 0x5}, 0x14) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 2011.846783][T22178] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000002 [ 2012.000676][T22193] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2012.000676][T22193] i:0.mC0w[:YH [ 2012.000676][T22193] #<^):4<] 04:32:48 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) recvfrom$l2tp(r1, &(0x7f0000000000)=""/71, 0x47, 0x2000, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:32:48 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffffffffff7f) [ 2012.049311][T22193] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2012.049311][T22193] LLnCq2] [ 2012.078156][T22193] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2012.102126][T22193] Error parsing options; rc = [-22] 04:32:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:32:57 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010200000000000000001000000008000300", @ANYRES32=r4, @ANYBLOB="08000600", @ANYRES32=r5, @ANYBLOB="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"], 0x24}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000200)=0x5, 0x4) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x48, r3, 0x921, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x400}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x48}}, 0x24000080) 04:32:57 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="480000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:57 executing program 0 (fault-call:3 fault-nth:3): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:32:57 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffffffffffff) 04:32:57 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) r4 = socket(0x28, 0x2, 0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000000eff4)) dup2(0xffffffffffffffff, r4) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000015c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="080000000000fddbdf25030000000c0002000200000000000000080001000000000000000c0005f98d7aab37d58ee16324ef1c0e64590000ffffffff0000000006000000000000000c00020006000000000090220000000000000000000000000043fbee5de7520b6a3f2433e57784375e3b336bb9d81eb470"], 0x58}, 0x1, 0x0, 0x0, 0x4008}, 0x24040004) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="440400", @ANYRES16=r6, @ANYBLOB="00042bbd7000fcdbdf25050000000c00060002000000000000000c00050006000000000000000c00030004000000000000000c0003000300000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x40000) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r6, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x810}, 0xc0000) sync_file_range(r1, 0x2, 0x4, 0x1) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 2020.832896][T22219] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2020.832896][T22219] i:0.mC0w[:YH [ 2020.832896][T22219] #<^):4<] [ 2020.893022][T22218] FAULT_INJECTION: forcing a failure. [ 2020.893022][T22218] name failslab, interval 1, probability 0, space 0, times 0 [ 2020.905742][T22218] CPU: 0 PID: 22218 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2020.907878][T22226] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2020.907878][T22226] i:0.mC0w[:YH [ 2020.907878][T22226] #<^):4<] 04:32:57 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x400a00) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="93a75d5cfb3c80fec6535d815eca63c8bb3e69a28c7a8f0ab6551e953b4dc3b22ae6e9920900000000000a58330c7b35315f396f170000000000000000000000000000f327bbb4ac0170725febd35cd6cd055e4dbf8a5b207b3d72c9537ec101d17aa116ed0f1f616bf8455fa5f43b581726a8dcd629b8e06ef47b685a44569d96b7cb41f72394062593c7be5c3395accbd5c4442aeacc3d3945e3f829d8e83231351e", 0xa3}], 0x1, 0x1) 04:32:57 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x402000, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r6, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r6, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r6, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$FS_IOC_GETVERSION(r6, 0x80087601, &(0x7f0000000080)) ioctl$KDGETMODE(r5, 0x4b3b, &(0x7f0000000100)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 2020.914404][T22218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2020.914409][T22218] Call Trace: [ 2020.914438][T22218] dump_stack+0x11d/0x187 [ 2020.914510][T22218] should_fail.cold+0x5/0xf [ 2020.957685][T22218] __should_failslab+0x82/0xb0 [ 2020.962577][T22218] should_failslab+0x5/0xf [ 2020.967022][T22218] kmem_cache_alloc+0x23/0x5e0 [ 2020.971800][T22218] ? tomoyo_domain_quota_is_ok+0x1e4/0x2b0 [ 2020.977676][T22218] skb_clone+0xf4/0x280 [ 2020.981850][T22218] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2020.987813][T22218] dev_queue_xmit_nit+0x2b8/0x600 [ 2020.992892][T22218] dev_hard_start_xmit+0x3ed/0x420 [ 2020.998138][T22218] __dev_queue_xmit+0x14c4/0x1b80 [ 2021.003184][T22218] ? memcg_kmem_put_cache+0x77/0xc0 [ 2021.008402][T22218] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2021.011238][T22219] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2021.011238][T22219] LLnCq2] [ 2021.014314][T22218] dev_queue_xmit+0x1e/0x30 [ 2021.014344][T22218] netlink_deliver_tap+0x406/0x4d0 [ 2021.035465][T22218] netlink_unicast+0x41f/0x4c0 [ 2021.040250][T22218] netlink_sendmsg+0x4cf/0x8a0 [ 2021.045067][T22218] ? netlink_unicast+0x4c0/0x4c0 [ 2021.050016][T22218] sock_sendmsg+0x98/0xc0 [ 2021.054359][T22218] sock_write_iter+0x186/0x240 [ 2021.059136][T22218] do_iter_readv_writev+0x4a7/0x5d0 [ 2021.062589][T22226] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2021.062589][T22226] LLnCq2] [ 2021.064344][T22218] do_iter_write+0x137/0x3a0 [ 2021.064371][T22218] vfs_writev+0x118/0x1c0 [ 2021.084784][T22218] ? __fget_light+0xc0/0x1a0 [ 2021.089389][T22218] do_writev+0x203/0x240 04:32:57 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x2, 0x2) [ 2021.093697][T22218] ? debug_smp_processor_id+0x3f/0x129 [ 2021.099169][T22218] __x64_sys_writev+0x4b/0x60 [ 2021.103857][T22218] do_syscall_64+0xc7/0x390 [ 2021.107698][T22219] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2021.108390][T22218] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2021.127255][T22218] RIP: 0033:0x45c849 [ 2021.131153][T22218] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2021.150831][T22218] RSP: 002b:00007f074b93fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2021.154799][T22226] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2021.159238][T22218] RAX: ffffffffffffffda RBX: 00007f074b9406d4 RCX: 000000000045c849 [ 2021.159248][T22218] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2021.159258][T22218] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2021.159282][T22218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2021.193817][T22219] Error parsing options; rc = [-22] [ 2021.196427][T22218] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000003 [ 2021.274422][T22226] Error parsing options; rc = [-22] 04:32:57 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:32:58 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x240000, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000400)={0x5, 0x4}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x20, 0x0, 0x1, 0x2, 0x25dfd3ff, {0x2}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1d, 0x7630}}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x40000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000440), 0x4) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x20, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x8001, @media='ib\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x44004) connect$unix(r1, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xd0 r&\x95\xae\x1ba*%I\x8e\x83\x03 \x883 \xc6\x1eym\x1f\x00\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl\x01pf\x9d/\xae\x1ai\x80\xa0f\xc9\xc3U\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\x85\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln') 04:32:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x70000, 0x1cb) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xdfffffffffff00b4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000140)={0x20, 0x3, 0x9, 0x8, 0x5}) close(r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x1, 0x7fff}, 0x20) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x28980, 0x0) close(r4) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$USBDEVFS_GET_CAPABILITIES(r4, 0x8004551a, &(0x7f0000000080)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r5 = getpid() getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4f24, @multicast2}}, 0x7, 0x1, 0x7, 0x82, 0x1, 0x1, 0xff}, &(0x7f0000000240)=0x9c) sched_setscheduler(r5, 0x5, &(0x7f0000000000)) syz_open_procfs(r5, 0x0) ptrace$setregset(0x4205, r5, 0x202, &(0x7f0000000100)={&(0x7f00000000c0)="c2fca4a750", 0x5}) [ 2021.523591][T22248] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!w r&a*%I 3 ym] [ 2021.540406][T22250] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!w r&a*%I 3 ym] [ 2021.561306][T22248] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2021.588601][T22250] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2021.609357][T22248] Error parsing options; rc = [-22] [ 2021.614683][T22250] Error parsing options; rc = [-22] 04:33:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:04 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="c00000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:04 executing program 0 (fault-call:3 fault-nth:4): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:04 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) syncfs(r0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='ecryptfs\x00', 0x8000, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4D\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\f0\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0Z\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2\x00\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="34100000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fcdbdf2503000000080007007f00000108000c0003000000080004000100000008000800ffffffff"], 0x34}, 0x1, 0x0, 0x0, 0x4c000}, 0x4010) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) 04:33:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$NBD_DO_IT(r0, 0xab03) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:04 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) open$dir(&(0x7f0000000000)='./bus\x00', 0x200000, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x101800, 0x176) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000005580)=""/60) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r0], 0x1) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) restart_syscall() ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f00000055c0)) sendmmsg$alg(r0, &(0x7f00000053c0)=[{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000040)="82beeb8d15679d2baeffac128e33c9e70b19d6a7d2cea865624931fca1f473cf12e32853c8b20d5de5720874da2bfeb8db1b408e270ec363e3edf2f2b0126f2dde2165d9c8508b1f2ea8b120cd36d9e96f0096fd409be117281f9eb9472ce92ba5c2a63924d4aad312c9b56de041240ebb3524776324f58879b303c3acca9e4221a5b3671745d4c27f5c4a99fe48c310baaefaf134fe875354242f06dd9abfa10c2c4bce1323e4e21e17fe6b904ddbd9f302f6623984e1bd9d1a299e2bad860681fe482f5325ebde5045f492773c488a749c550aebbfe87d06e21b5baa93251364bb7dcc928afd6a4f4a41f0e3f7ee8ccbc8f87ba06d8142b8a57bc084ba8ba143f125d800fdf095cf0af84ec647eb14f57297535a2c9d6fc84256b46b23b29d21f909fe9642fc3f2937ede9183943ff7639154ef5f3317b75e5f64c388f4ca1a1734438ead66845d146fbf940645615536bb2533e540ce4660ed48db4c2023e0182277bef47dcf4acf2ad8922b677f713c25a9b74fe3a8c197e150197e709272ac293c4216be86f95b7167f9e8f589b6030e23b8c18729b41894fbb3fea752548c9645ec19f6a042b68f613645b8cf659ef7bd8fe1d492e3f8c8d1e97a09423ecc9fc1a8b02a579d01d2ddd7c4d6084a441093893f78ca247abbc12b486c148e401e64b143a41a6ccfc235b5b17b8b0f287821d8c6bed3935f775703cc5e2f56a8f8fc01ea354682348a249994f1ccc931c88ea60f723acac4022314ba5df82afe1a60cee86dd36196428bcbab93a35646f2478aba74b21677133be27d1f51ba84b657f9fe8eef91a083f1c212f17cd96da9d3ce01e2c992a03bc1f26b508d9d43ff9c8bbdc7fbbe3122163c17da90e57d72af94a98ad3e3dddef4e7e968689da3b16224e825b1fff22f2f02d969fe4426b51bad3e5cfcb5c88a9c6920dbc37bdc509ab8c1738a144f3a91df218d3e526dfc6a4f9a2b79324c9223d3f4e8732b90029a0aca8f15cf7f4fa6d5fbcae4f5810405f3e818b1f2cd3e1daa71a90812957a9207e68b90cff9144bb5a77977bf7dff31a4a9b8e95cbfc0201f51ab8c4dc3e559641704e0c50346305bd179ed6f860f2c8440060f2834de7cdf620569ecbdc4cdb0f4bd673f2a0d39a6d942f541f04eb92cbd603e41935bfd24fe0cd9ef1e23bb703a9129a6ca96117b6155ec1e3a1c706ec202aa79f95c9c3d6acd05abebcb29e3ad0b4fba32252836711cafd4b6c9353f4584c48fe39c68c87731acb0761d6c03c46d7d6752bc70788c195fdc3ef8a0c167ffdd005f56e2b7f7937415887a43b913b2ba0125881e92ae82310a27019480098fb9eaf19805de0f457d4684d5ab6ebd6966385d15344f3b6459af5139b9d9ee7350ada0cf6915468e3d912ecd462cb27f020d74253806900b6f0b10c923539f003fb964f4d83a5d09de0445b3db4bab4a0b9fec10f675d811112b4581654b48b9f8d99dd52faa6523a8a9ff57a7dcbea793110b12a631a57a4fadfd515dfd29cee1d1fafb387212fdc14560550ffcc0d7dcfe13c901aea0790bf2573ffc722f0e24792e1199ddc990bc8507361e6aa41894df041df6312f379647746a612965d7d603cc6539d28479479def17881d9d28e66ac26f58145c1a97f3b2bda816887673f48a9e9eed97ddc3e48296f29f4047918d944128f5a9646cd1bf5c3845abed455a4ce78a89f33c1f8509b38d4258054deb0d07c41db8a02aeac9247a44f9815d4417420d1db79401fd60b36ea1ff907342dcdfc2328f44d264463a7a7479af34da88009e58d253773b6bbb71e4c719148ee406c409c78b6c4bf0b0037567248c48320fe4fb6e4b4cb12ddf8c3fca5e79682934ab1b755a2939ae055b9fe560aa604f28bd27eaad9ce5189f693478ca8eeaf636a0effb9aad4f349209a9a5aa248cce33e8535a2cc6dfe7b0a413870fc327bf5e7d7b57a6f0328433ca6e60b340d9bd70ed68369914540c322b65e6cd16f010f60c131589cb37eca834458ddb7a79b6bf94561125f9a6176e3dd2a7a21d3e9aac09f04383ec0df10305c4a1fac18ada307e83c2bf10589ce93fd550eba7877f652dfb96a300d64e3ef2d2d71c85218765d03b4f6560a10825383eb276e8bff087ca8937076040f60184c6a1dca0c2a9bf97b9d5f35a5ade89e38e3733b05a52a6a34ceb036dae4d004b7b7470f41616e9e4d35f34d1e1219c2ec0dedd5cd95d665f205fb7eaadeae7b96ab32b0c2a279259f1a9b2eb47f6f4220e1ef76e1e85872f5d2349b8bdae4be2f844b883f3dfce710de9d99ef3030fedb4f3b14a10adb4b9b0747b480c515cfbecdd7fe950fcdf08d29f0040ef8a3c10790603c44bec53b292d2763711a56a3f5524d89f01eb49781f00e6cf2b9cec95051d5ad98e42b86e34df2d2850e613d05ce0cc1b4b502479d380f008f3441f7db9dd46d9c598c061adbb68f684b30e1295bd26ff63eca937b274de40ffedd64c8ffbbd775790ef8a2c45e759135ea03bb0a5366b634e9f7562570afbf2d7f8a0c51e335a3513c2b5412e42c519a706cf9f7b8c8dfd41ed209678fa986761ca529370b26c012ddaf79d737a2f9b159be118422c21642b5a8406c461b54b615989b90b267dd909f9d4d9367c1721826168abbd43c1f62f23eff1a0aa8514691020ba01693767faa3d8489956158fb3067544d97ff97c1082a017fbb12c75ebdd9cc64b46d81295a7fa8e2cc839fef4d5dc05d9b0641364a98b9d306f6b5fa10e9eb82fb3b385489c2963b9ae2603cd96964abf41e797c23b0bb86195fd10018a27676cb3f3caa9cdafd17a71229d370e7dee6d1e10874686389846dfbd02c6de640952c4170059f8bc4d3c30062d98221bca5b66373e1735459b524f8d70719c82e352c274f60f588fb8e64318fd05edbd42cfefbe3475925687f03e9b61f2e6ec207b1303fd526fd8c73989c0d696549d29bff5e3f366fe1646f2d41b27c04dcaa38f3adc21fbe5d3bb1e24a2bb4ce6102b85abf9179891b3aacc90c6e5bb75ffafdf6dae24acc270cb051e48d214b48ba53b057f4e41df77278d6b37372bd1c75422365946e26fb30fdfd66f075d95484fe157710fa4ef999431181030f326e3eafd47def9aa93f6aee6e91d099b93f6d360a3a79353b99a134d48912903ab5b89fc0952854c7beb8023b9a25e6cfd76f4d75614f0a9b2a04ed1cb60bcd9477783e23169fceaf9190b1e7df1626cf62388d1f1c60259d217cd240b5b930a2d37392524f489e6757a14c87a90738451f963bf6e1dc52a892c10a8ef365d0c73979a8999a55704d73011e0e6c35e60058c99476a86f0a68a124d957a79beace2e498e7375d84e2e11a6c2e5be779d80bfe7fd9faae2ab161583ab60a278aa3fdbb3e6eefe10cea4dd2e1fd91aa7dfc8b057b2c6d5ae001dd58e9c59d75ba9c67480c6797069d29496ceaa1ad064cd31cfa197043aa84a1667677618521c050d74e43666f207b0989b8d000484992a25bc2a13ecf4dfe2d8a85a7597c0d8629cc4e083ca80b92373c02236952c8543f88e02509e5857317fc93d741402f8e3bf9c3b24bbf68aa989430dd071bca5592a54d51445654dea66696597a79dda260fbae433c95870e9e8335c16b5a0f29399077e68b1cbcb6b4f22ddbaac58a91fdbbb95627a338b792ca6aa691cb8c6d5b8a5204a89a10fbed3d6f86f1ade98a2cc41eef5d6e7ae0e962d75e8d9ba801e0c8ad300f2e6564ba288c6cabbbcc69165aef51424ef0bd73411a3e7dcef73d6851307b1e1d24569f40c5c31098f39d64e8ab809e205abd4fea94926396641c1f399108025b9a7d8b4f806fceccd4c69aadb089545c65967a852184ac04307ea67102d3ff5f76c91cbd247560d72df508a1fba20edcf3eab09e459ab5a24e223aa561791dbbf65d71be538f8ea099f42606dd125b633c67d2cafc63bda0577d237439a519cccf1d9a322861e5175cbd7c76804aa9135fff629d158d428783693667df1ee6e428eac82896831a0c7312c4852a73ffdd920932a07241855d13f79f74b090bc3c93d27a33094c71f28855b4d31e444612970bf4f6488df4e3004670504ce0d12360d4b3012ffb59e93ea23f17f1c264f3a85bda243d54e74c2f40bb0fce9ebf50041b46af51b32da42c03b10febca04c374292ddf52b6b9e3e753a2e171e2fb1521013762382a1cdd4510fef3d2783f5fd07d6ea5abbebba646acc2891d8a83f27716f7c2bfd79ec39ee46c51bf61c3d05c6116ef9f22071b452a701e2d280f69bd05c809880b383b5cea9982a1d91014491f96eea8f52c84ed6d0120105d55f5f7edde49326df8df60b85471c7a0043a47c897431228aa2eaa0f194f17bf19e7017d79f8446ef9401dad3584701bb6f2766016ca4c0fd5e250b29bb4ba34697550b9f5c687c391b4eb4fe153370c4014e73c66ab0000583c581b0b023452aa9ae14d628b4fb2f7d28571421ea389766831ff57f8d29b4569026842a70e7cdf21ba6d4df80fe81a71ee2d0c7465e641f81796e5a145e38eaa11779e1314946425cf51669d564454936e0427b1c0df4166061a641eb0b5c5b4ef35d99c33d19694b49a95fb12576a780f5cf7b1ea5fc974bffa5811f13da696010735acccdd8ee836fbb1ecb2bfbb0ab8aa032b9ebb486a270ce05cabeba19c476c242a8aa424aa81d46f274e67b1f15b780ab1a964b9cb9c6262ffddee62395e07396755b6ff8b035485cbc882ffd823b2a114e1269c1dd1b20bcf82fa1147624842a70d8dc7bd4fe82e6a49dab06fd686c978c715a795dd3384f23a3563f9320ec42b0840c91f32716e8f1cf527b4e9c4819b5cdd75fa9a53ea8808924a8b3bcbe9113d9a6daf430a27fe7bec97c87bc6fd7d1afe5a713aed0dc04995353e698da1bd051222e5ca81d9fefdb7d6070fc65aac575aa70b21b457af1b5b3764e9ee6474a2a202b24ab91b840a1a9ef4671e4dcb6e98d54ee08eced34009a399c8ca5cb650a9bfdd9ff6a9b9c51ee1c299b2071176d191031164cb04936c93926e5b9b850e89c0696b5e7f2876c8c8f6bd366ff692ca040527f08a0ad60a1df8ae2e01283c3d6720d2842522d76ca2011dba68e8d919975bfc1a3424eddf9e44f2a3c0ce3cf0904913a9cb93dabb356e31fbcaf4701d9210dce6d6c76f765f9ddcd7a6e9c61d1b9f83bb8cc7502314c4a196708bcb1c8b00d7c9c470b7c723d1b3f303a95a66c47768144c2ef701d258286140593ce48ce41f69d4640e51cef88b178ba7a17463ab3b20b39583db4a108e5ad0d8b955371a12212ce9ff55f42e221ac88f0ef1e59848943fa762132dbcd62c0d07fe291a44b192a1ee1f5f73a16cb9c54c484dca9fbc3e86cebb6a7b81b6c53ec2ac9291c76475a7ff9d53c8f34a27c52bb5daf7505487f21158e7f001a6861d6c545fffc673cf7d2fde3c8db82c86d293d8396eb89fbdebac6240822d5595dffb77f5a2172b3aa626508df2b308435735b66801ce47adf6f6d4a8ea46ff05cf6f89755ab75603f6778f7c577cda562655a894c823f53c1e153f2177bb15d789505e7fe8a7f1e6bb5aa5c25c62dbdafdd632caa78e556d859d03b79f47846517f4cfe684a63973d3df29085944907b084dd6f4a1dcdc3dd41e4ebeb1957f448042bd591a40deb022eddaf7c47c2f4285e9297264698b80b039df270addf2a3a6156c84fc7fec231c4839ac9e6978bf4d3a926bd85d4ed9912dcab727ff685a26d03a92cef58cca0ec053f0a8e50f588243d4df885c494e6495b7736ad8c9a", 0x1000}], 0x1, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000017010000040000007200000000000000180000000000000017010000030000000000000000000000c0000000000000001701000002000000ab00000000e67123a8f9f53774a7d30e4c66a52412cbd785f475e913ba605da5af7a25c209527c3421dc4f47b4532409c651f64ce07576b232312b28a53783b48a28a8adde959eec615c52c7d30486314b33a4cb91fbca9e0147f36f42f4d1a15d926ffc58db5a0bb3c271982c757c37a2d44c3d53fca16a3a89982736c91fc91eb5ff074f5602fa8400507be9a5e768b406b7f885b79157ec3a2f53394ae5c9e7d262e566fc8e89dfc5b877310efb00"], 0xf0, 0x10000040}, {0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000002040)="2f8bed1065cf08c310c54843852135a1bf4b6dac9087a2f2f5fe7c7134d9f7f99afb306e3f1d854ae3e0a16305f82abae01274fe0313ba90be9aa8d662863ebaba18ce39233e32e6bf53ebd444399309a4d2305ed12f8e928abc3dd317d72d6be1e9dae8bb69a9ee74d248dce2d4c9621979110266508c326ff37b7b5c481cf0e359ac43a3b1aa90eb7bfab25241b725379e1cecfe6ef2de920629582f50ab9be009f9b95ce14e27e6539ae001ba934a17a6fbbb91277cb3fdcdbf5d24d6a00ca0adbbd747a8a3ef1986e519f90571c46e8fba7bab4bcca401785ac367c872af1db50e166b1182d13ad0aaad1c834551c597265f6867cd64860da84a7b62d357d5298510076011bbd32d8a9b8ed051f904a7d23e90b2cd710e735d868078b1bb3508531e306ef7ec10c2c159b318c4e313f2ef79736bf217eff1cba492e2a8a702a2069d5d95abe0d65753b3da0078ae689a43089b790681aebe161c99c8d35def3c5d24317b554b175eaad6e5f483a0ebd86e7c56bf13d6decc9ee8c9e814d3f16a6e9927a49d85b8338862c5b7c0539e70f3fa866a1778f27cc6bd242a09bcf3d59fcb97ff5463023aff1e90a3f87eaa2c6f9fdd6fac26addac983f3bc1bf1efc621217d9b7af9e71eaa0ea4d82ac51567feb224281d19a24bb710429e3df578f8b862288ae06a9063d4ad8b3bcdf9e068e9b2e2fd0c4c703c189e1d5e7817f22329965cc04328703ad01ae3a7d8508e77fdd14d765cb3250db722c2c59a71c3235d2573df08d06b9274ae016a1d9924ea0f0a16b6258843fcfcf1acec62aaacfac5525fd96880a1cfb7841bc3f1a46f63cc03826ef0f315998c54ca5a10a83a56aaa8d8a33d1647f6029b3ece6992a95ce8eeabd36e4a4994cfdfafddee1e9b1c47ae9adc09f7b67f30a4e1f4a2f5e5656971ade1355c1f610aeae903717a6b6ca91638b850d7cbdd500bf7b733ae8e233471fb2692de203f0d17f6be0fd96884152a09875e21f9f5b7ab58bc1e346a01c988710acde9ec63990657c1c90e1ec2aaa264ceb908959dfe0a51fac4749395e4b7d01a687271b9bb03fe36d6ad02da2146943125f39f0a1c1a58b1a98fbeeedebbbdd87340f62f97f4f183b378fd4a4f4579f065753a0a27b028348908007e9e08713f840a48c556db7774193a4e32007a1c98885f59edaa1974f23e2841d35a2db92d3eef8e4a1932e6ef1bc6cdf473d4639429c3219f341a241c5415500d953a5ba5154b8aa57d8313ef8a9e9bfc7b195ca3bf7e0d0bed83f774c001108a96ba1a8cf4f8e88123c286899ba597ec03c60758c20cb37214e5eb62b2d914af7544903f39fe96e1fae9d3ca1523eaec4865ec5071a93cca15f30c795efab2d6006ce91c5d3ced97de80946c900f9ed99bf02d0f8f861c75c55fbe1714687e12bc300d7c47ab855b5b22345bb6b84a33607cb6247e6bad71d84ca6f6b480da7279ffb54157d2ce698d0fd673a29856e00f5b5738d15b5ea13e3ccd1b49c9e0fcfd736d970907c1f11b6a4f65290201b8e0c69251a9146d1d73e116456ef9a337e4e37829e4f89c728bc777ec09304b6b69b6eefc55ae295e64fdd9be3fa93ecbc6c14abf474fd1d9c2f7dfbf8d1839ad32081a647680defe537fed3189ae89aa0691d0822b027b0afc996f5a1e6dfbd6ddf594820d95c79f063f86772e0b0864f08534f74cd7a53fc6df3ffb0aed30bf584de8cd5681f5987d39b83d5dbe80d3daf4385a9bba3d0ca9c5d0fa97f916f9859b48f31313bc1d3cc07437617675074b48d1626baee72760af632f9280d42728f5e95e531389d56752da670945dc7ea45ba248039eaabb88cf0ab5d01c05f09c8386146250c88514e5ccf4a80c9a1f6881662421bebef8a795fd972a678b8a9e614226a09ea4bffb6c6414dabd97e570b1e1fbc41bce29217117edf270d3c57e79149e1c8402b88ce379207cc81f2927278e613d4cdec05355818c373df48e1040b2af358259f98aea2b69c78e96d7b5a4479e6ebe4634dacaf3066cd8e08a25222a58e285ef2523718bad835f4055039622d2719be0e1d1ec2ea13efbff7c3853195ebb6d76da5aebfb94115afbc5fab3f3fd19e026731b912842dcf8bafbed3797f8d8a9c62b8fa13a91fba884acb39f273cebfc95e0e0c24a10dcf96378ce52a1936e1e21fc0c4b111609a72f4a6cb934235ceaf584bf3b1cef8bf43124e491ac14f24069c0ae954868b082f3065c869fe35150e8a606a9515d0447e635109590f5ab3e33835765ad11ffa87947bbabdd89d225fa00e230c81acc25f1f86226d56066718ca776c867cc6ecde34dc433ba6c70ebed8fc862571bb9d2a82f857e5f5fbc9bed1cfc2071ca551739f1027ed7bbb7f6737563d950556cc847779e48f5f1b3dcdcb916f00f61000f10c56d9e4c0e517ef77bed9b5d95dececba90bf19378809afa45dfabab6e4b7dc7c63e831361ad8c4738d13aab88ad4a072dcd14176a7df7de79f209c2b2f165a3c18cbdb9c3fa53b3c2c4fffc59fef77e61a2472135d2b39c9b1f663a781ce55e53fe0349ed6b145ee8db4c471c043966879854878aa4528272bd78787aad0bc80c181ceb48cf304c13867f8fe062c67b78a1a579b3f60d6e24677be0b2d3794f317ee2f8fba492669333ba953f91d4d0a23da509319d5cfb6252bc98d260a8a49554056fd9ff112c1476807e38e973bd7fd04a481dbc397002759557002853f211b0eba3811d7b9395b2fab89c31e1a2d85344a5775a5cb66fe2c7ed2b1204aeb7288043ba0c8206fd2b2ede02d2d3d48e3e813c68935336845f66bcda5efef7f2d09953d1c55f5b4d9a6038e3ab3f0cd706f03249e40786d123fda372174322bdd114b28628c32cb844e60f2e8ad1efc9e4b6159c48ea79d73350ad7fb93f4c82f8c41a93d1b3956e884e0779741b6197a61861045be1eeb8d4d6e05876ffff603b8c52a06bcac69e03e6bb54736806b543af14c4f2955bdcb4c0118b89e7732f18c8e165b08cee4ee7b18bbcac36f21e831f766619c68e72df44d09fe7c01e3c5c71c8661b92e0ba9d6fac23c691cd88260119621968d1dbaabfe92ebadc791906702e996da5e076abc6f25b470e8902a740e14ec051feebfb5f0bb744ab285e8430ce779c555c989faae2ba5003fd11defee0aa2c98297cc593fb4cd0b52199c2f8edad5381e3ffe6b68275ad062d7d7030f9106cb27c586e0c2a8efbe5310e56ddacea3f577ce9aa7452103b5ebac105c7056562057d43a954470f3e9a965c6730c5671a4065677291e68c4e84e857738c3d9b2dcbf8741934bc52f73be29f1aba7a0f91a21ac0f37f5f8ea37e2ccc7553f6d0984a44b8a7c698acba162a9373fd730f18a65820dcb11910820849157739feb4194c270db5222aa7a20a8af021cc0de17a78af6abe2660d4d94e48b791e3fc6cb99e059e3316e9592e8f9de5a5124ae993667b575a3aa04cf535551abe802425a7dcca47f28c79c5d5973f07e49f3b86e126e431a6909f9c8c154e65038e626cd397b7ae55377c4263f49951164ed7dfbb58ada0fd43cbe4c08d35f1e40a16aae6c48359943eb7aac99f18dd6813b1168b00472e5226a95c6f9dbd8453fb540647f6c75eb1989f6514ea16e241498212e76902a87188571ae31228d4dea49958ba51c4c4ce2e6c448a4676b9f1c65d02fa891993d4511768920313e88f4c035e1617733ebd97f276d1c53bfee127d91f94c502899fb7f4237da9e00e4a8999bcf9927d8b718930d24fcf8a42da91cdcf67aebaaf5cbd9c9ec303a1300883d169c3693183409f7fd7d3d8af8443e3846837803c0884ee6b5cc23545e195bad63c7eef4230186bc52a3368656ee3a0e6d4b1952bb1f97e4925fcc7b5c2275a05554c7099c376772f875daa51aad7cbf47dfeb452551e015b43d4307dbf5330b1f0488c345760e67285c13aa73c6212a3844fc63b2f208699feb952a2bf1e4a6272688aec428e5edeed0798fc42b42272f15ca38e66099453f06811fbf5e122f3aeaa11e5c83b6cd427d004abeacdcc51edda9e50ab7b50a4194ab8c3e7e9ead7cab576e287a0ffe0124dc31269c53b3743b593011eb20fa72dd58c8641c6e78d3c241108acdde6c732bd1406473f0ff0b4fc5ef9f01d57167f563726fece182cfa9a5f23d4e4190f94daa5a3bbeb8292630bde292402a02e225500a524d839b31cb27c39e4cf1d9b2573edc9b8de09c9efe2d6101fe1317b48327d7edca8e1550020d9a3e0d42426eb3086b7d68f353c80cefbda58ead74c08d5a661e28dd438ae1c0352856b075b89d3721522d29d194457c4e48f91013367bb165466bc86384a60190d2dbb994c6f95f85a865f5ad043984cbc92d32efb6a0356feffd0178e46891452e39e85d6b6e502631243b802af0757b2e20c065095b505f68ff4e37737b15df7e5ea32fb6db863952cfa9b0162cbfda435ae495b4fb00b4766641a427e397cf1b3b75174bb18ec6fc88a48f975a627ba79343401aa45e5e8e5ebd868ab05c123c71f899ba0c5cdf118c52c1b2684b3f3f726fb81a197ee8e3308eee0a97b7f1ce6bbf516ffe891ff864cb25848e1b505d89bc34019ce53fb134178c5c381606281a81203cb17bdbf586e75b0bdaedb89ff9d70c3e9eed1b7bf5a619effe9ff7f1bf869ae20e1842ba5c6123c6f2e580cd674d6641dbf1853abdca8da983499f5fcfa572b66d020853807a35aeae08bcb07ab05bf49364bbb82e164af1db33110320902b559155400d5cbc5948cfadb6970e4f9c9abe662c2b643f4a94a3b3baf13c97f8c12cf5d4158a29868c6feed8d186b8431b4c05a22b4765c0d69ecb73f33938d3763e7ac4efc88d70c9f22c8e3fb470a41ddcd14e150ea7ef6a3878bf0f5e6095cd1aff1d0b6b13cc5424a566d9e18c3a2e65988b4db039cf7d09d673b93f6060ecf65aa57536f3f31963c7c9ecef56223ec8c6ed2c66dd9ee7d59ea61e3bf62f6fd2dd59b3a23322cc2217a507fd8bf915a033ebb8d719a6f4b1dd2af6d18ad049d8f928ca241ecc4aadd122381bb268c042186a803de7a2feeec673ddbf410fbd80a88d132b4a697bd6f44b8d62d76a05ee44efd2d195da37bc3836c9f2bd1f0efcfed214bb71de57e188d8afa09560b8aff77378eaa0374b1904c61d4783f839c1dfc8494545d39000f20ca4114fce6472924c4fedfdae3c8e00b1a49b1b8f3c6ac1ae1810e47a0a6b6a84a12618ff83ab9e5ac1e13161d95b374ac82811ec127df30272409ec2dfefb396efcfc379f12d7a581c59a287477a0423c57d013315b49eeb4af7605ffc2cd429ceadc5255bfdbac10bc6eb1be6b132e2f56206a1e3bd8fb375d0f674f95a413639618c00d3ce316ba86138cdd328344426f0974605628f45781ba8cc1f4fe10cad5689a4f9c8b1dc595912296402af9f8df77d2267496200cf4b537c211a4f13fd89f3429ca2b069b13ab7969191dd1c661e93142b71ba3a76ba2ca1a52574c820a10eebbdfc187ad7bac561ccf7d97a88264b876ed0e2b1cfea0e773a20a9c23d6abdd5d42b571a8613d2ff66e9a041cc5984063b768ae5ccba239c5c354ab13c64e71012911689dc3e6be6453d8c7db541516e80d8eb9bb77e4a8a318711ce5917b4ac9a889a1e76a19b2376939aa4d387b88496e6f19fe235d02ef72642e5aa8db01c7f1b66ca32b0c846feb790d75307713b53d6c29a899947a50e034f72977606247eb50ba4c21db060bd62194094a9f7492bc2db3cc6cc3d8ce2788f1e35a33ac5bb9dfdd", 0x1000}, {&(0x7f0000001180)="b15d5f5c3aa3c1dc776ab447e37134d5c3b8d2bcc8c8ee419abeb2e369", 0x1d}, {&(0x7f00000011c0)="a4b41cfb05d4ff3a953257a0c741bf45d73c8b936e519f217b8c45f6d73118051215372407ba9bb7158c4b714e2aee687100fae1a01964a8f0bd9773b72efb78cfd65f0a477717e6a7b568cb86a45d07d5ec65b353db4a3c399e470665db762845b58846c14b3e983e61d11733b354e0cc3c7ce062c1e5aa21a1e785c647667b58593365d2f15ed1ffe7e7a40e363bc853b2478903eb613562d072933317ddfe41cbd07e7f770c60cec8740c98eeb172ac2a2594c320d6c06f4d6f221848bcafb2100454e079aa952289271c77df", 0xce}, {&(0x7f00000012c0)="0406108f9106813f", 0x8}, {&(0x7f0000001300)="af796695384f6f69c448b36d6508a4a8948c46601d732ba1f9247f133136456157a0e0e6932fcb00ec1ee95860d597ae1ac6f6e21d3959305f9cecbf47d2156d5a4e544b2309bfd0d5de5a1381d1b4394d59eba5c7061448eedd233507b2176937e3", 0x62}], 0x5, &(0x7f0000001440)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x20}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8b0b}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0xc8, 0x117, 0x2, 0xad, "d07d4043970dd5c9cb5c2d541e2258c4af60abfd9bb91489e4269e200eaf13a2c4e84deffa63d089a89d3b2e429c594d6f736bbec14c4ba6c884a198193820efffb917c3051f7b9245c67d61f8dadcaa5bd46fd7ff02ec6f1736eda87ddc28de902c6453ca81203a71f5f55eca13c903e2f90746713db15dc80d8ecbadf68260d2d66984aab49dc36c24b43457bf114bbf99cacf08ed38162a9b92c96ea26f09f0345a377363c22a637f4ca04c"}, @iv={0x110, 0x117, 0x2, 0xfa, "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"}, @iv={0x50, 0x117, 0x2, 0x38, "91bbb8c5a0e66b3bc8433bd4f8a2d6c7689d314f4baa00f304ea7f402b7be8bb66ae42a05b4a7d89b457f9669d760f13e2451e4f0894102e"}], 0x2d0, 0x804}, {0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001740)="af95d15b13a62222008d2f628396dc96c240873a1b1309a27e94d46cf704710230d3cc5756e22c5711befd35eb076c9d966ac2aaf1b39a8a24d109c7543fc41684d7ec57d9bf235b7baf6f", 0x4b}, {&(0x7f00000017c0)="d078989da050ca5eed9fb6d20674bc4d81e837625aee54eb6d83affacacd6d79a66a96d922", 0x25}], 0x2}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000003080)="bdf0aa3a3c64686949d5f3e2663ea3a4675891fb7f2157b9fcafd47136789fbc9173aa690e06daa10921609589965f30285454951d54d0bb78db4d2fea57850eb3d36b0a46f6e10dc98fdb9289bc606f4be52af4b1ec5c02b531c9576ce9906b7f2a57911c3ea461b28ccef628de3dc6811909e0f5312678c41e1bd2cdce242d05b81ad79dfd66de860ffe8c5973552641cf168abf1257fcbe93f3c26e26df299e2492ca8a1c2ec1e457745ba67e5e0e3309328b4dc3847f8768e99b91c25006de62a36ec4f9b9ae5aaa4d3a461dcce4330dbf8ee7f3cba9209bea18dcc26c0ffc8caeb7cf741dc699240a6c07c87bb69b9c7494e5b9dae1072a2b7646968ce6944308fce553eeb27a2f95b7d1b3720f87d5c35632b9bf9756d6eb4f9ae8a5e442a410b54a85cb9f5a8cf3c509449b9d6609bc028d83a601920edfa076a9345b96505321e26a35988c56e02c62fa65150def74175e265b90628be769228c5ed1b45869e87be1406e9bf826a69ddb0b90aa2a761120177f4120b0fc2d346908d70453323e351e643b489110987b3125232a38fe0ecc3aafbfcc701adec4ea2e0eece2b581c6875693d1b735c989d6c31079e9cf93bd8e07ae010fd25c160c2ca1af8e53af15011a7ee625def8af74076e56e7f7b49d8b552c191d941e20626e689f86596e23b94ede4f43bdeaa50b24efa5d92370f857ae38d9a3c68900dc3572bb0d9ea567b11131c433813d3543cc77ed00e19f66a8fddf6515bab989da7ac74e4bec472d1e1199567a3166fe0aeab80a121ca852ebd595fe472caa970fb958eae7f2f464e771faedff918e9a4077a1d43cbbeafb057fe1bc8a88032eeecd2306b729b17cc690a465566d4da8c531c52a4553e909d39a3c1d6f6a5c1e3c989d0355948518fab98962814686c49399312c59e9509205dadd1695c0fbf0003fd9f796424405ae47784fa702a49a25597af316d6666d228a0cc49a0fa2b21a42433bd17bebd262f0ba3ad005fb3b53d3aebbb96f49e13c7adf9c02f7acc7d3a20d2770bf94b1036adb3b17a9ed927689b037b51118807ab50d7142052c118535c31438a3ae8c271892904efe6c075feb687bed99ec68eb319999adcf12ff8549abda916fa5981f575789b34f00d756beaed40dd9d33af9c7323440930e296a19e745b8caec1c6fb26fba09b3337213c554f45f7bd7ae3ec978241876d72527270be5dd38a13de9b7fa1152425ab6a1fd54f8ca0d5b6a3b5de67a50a507364eaa736a3afb9e6ed473f4c9103573a1badafea6c0572108befb4b974221bc2ff8ef2f817f7acbbac79e6634f7c123f555164dc86cada06b603eaa0336112530f9f60ed25dfe5248ad912504ea41ad7dbeabed6eb1e29b0351a3106a37fe3a65432bd702edf7a4674577c270ad9b73deedf7cc45257e8bce61c3364b56f56dd8c0857593ed37d89fd70e86c4a60c8f02d595afade3cb613c93d51aa263ab147934009af7cf9daeee836918be78a67e8707f49f92d1450c31ed4c70741ed1706246be5e352e7bfc8d89d81775f22b391a4e59bfc16829c344cba88b128092b40fa88580619304e288c06f8daca656ab1bf29f140cc67c9f493bc81d0fcb0ccc3431684ba0e4123b7a7bd4b461acb7a3112106b58687e34d89436a713bf5bacd825a12c4e598b5bb0879b8e84a29d0bcfda79ac46c3d6a76d03aa95af1bcfaf011c3781d04f21e2a67fb04a4007184b9ea61be215426470826e2eaae956f475fea165bae420237fa95bcda0691b0bdc3ceff755730eb3e89aa42238e5731a88b741ec6ef62876a833a16d913de4efa9092323b798c6a54a4fa29e3d321d449beaa4518d08028cf9dc32d4d10eaa85fe6674ce2bc5367187eea6862051ab6246d5229141b0f5165f7109bc887881e0c63e7ecf7f6144646fc774396495a7a1e3cbe4f116ef76516b5eb5c5e39da10ed9913fa10016efb7f6dceba59083a7cb95530649d79a57c6c15bea09352d05fcbe322f3df3d597ab84d3541ae09f4f4bbe10e2b094b6e507300bc3bb3257aef292de048af0723616f63fad1f2dd01c101f6e324b380a2a4dea75f8834baad3416b1910e1871e7124e8865c5e27ff5a579bb0895d4295b4fc4b5dd9ad7b3bfcae2e91ac414016f9a243fb991077249b36cedbcbd2ff6d7abb6f85148a9578619549ee18a6b8f5c1027d5e478c0dd49ef732b8989400ed68bbd9c528c4fe7be6281c67c5533878263c4d2ef673db848e9e2c42a9324e4a94b0b80c4622ad3b3b529035a4af559418edd3458d4d214de7e8be4246c628ae34b1ee6d386ca5bf06609211253ffbe51c3c65349c177009d852566cd149508d00ba96ef037d21780e0fa405d25042f4beb889d020a110770a2cf2e2ae151146bd57746d60d5823fb202dd52f68eacab49714b7cc65c7c5a50ca338d566c9119a2844f8236a5e9f83576c1ce88238bf471e4328e328a54386b9004be2fa5ab956f94ec8043a79432bac498adc0e4a5ab03f9c4ef9470b12a97a9865432c88fa9a25552cb8717a529b196f699456829b3441218732faa39a148009656259a870817a3a8ed1e81cc04ecea95d8c48aa94341d93e37f3d3ae45706c26bddd8047689b95e5a8fc96ecf6806acb1c39fea54cfe8d5b5c2e7f182055c419d22203958e1ab12174a31e7b062d80e1e1660e5eff438f01910b659eb2f3925b4662a247fe720618a8097d162a9fc6c8db3b0d0e96fe88994d6533dedcea54d4d6971401480b1e29939cb929a267d06b71b21d7655bb2d2ee896c57b39d195deb2541d6e22fcb4cff142a9ea2d693a6b733e667370c1a9512b27d72991b3cad9d8185fcde3bb33402c8767a76a2519d233ec237b3330e46830ab2436e38e68d58b6e55ab8ab23405989ac6c8602d2a778adf233ac5c098850feab4f7b149c10538e47d7243f12e9800f67b450cf2b329b747bcb8f83d003a053b3671165c789b1f3617106e3f9d3707d56f1f9af39efdc30f1d97310adf917eb963cb783d5f3686ff396c20086e026fe6b3f779b59fa22288daf96690881f68f0a0e319fd50398a8576ebc7ab2d443a55f9e174eb100a2099ab2a7e2abf350f2be501a4b8bc19620d8957a347a684df60127f1a3f7a9a8975fcb81a35ee53b6d0cdf7018b2622b237dabbbb17a98a67453c74719a73a6f3f240028a5f61e96c08c2b3c27fbfa73ccc9ef3743b589864a8595f379167c0ac286b548cac451360dda7eeb197280c70490d7a389aa551c9163d53e8e65bcbdc0a1b00e4fc0db0cbf51721293a60b7dde7704ced4a002acba5d4ad2d381b9f8d6c6071e43833acda9b5ab3a0ad0761495ce342189d19908dacdf693beaf5266c03dbc21467f47cdb889699a74479f3209b8ec739866dab18965e9d7d1f33f88bff18eca04210d1320a10653f8a5bf5d7cd0fe3111a49752dfaccb5d00493390e053eba3da0e955480e044f51d111ddd7a0d103b604105821a618eb820f83d85360b2d65630a302a35e8832c4de494cbc8d1b7ac2db5752f6c55bc424927d0798b096ca0f3a194a95dce3ff7813e5ba19a64a4e74907819f2e92eed4389388ad249db25e20cd495fda88726399c763e67c039a36f9ac5e8b02a075a4691f299be9dbf632565b99de89e8167358eb51e1fe9783dfd99cbff0375df348a5395d3f6446ae10e969b2b42a2df6650f801e3a7ed3a543d177860343232b4e8ca7f3b5d7cd826730cf55a3bb1e3b2e7a4c07084c1af6674586d9d17a25106b6d1bc04c253d64487d21b6d95dd8e1fd74e146cdd09615cdddeda21d7bd5f1d57f2a4033d8475f81011445eb0547be31248afa26f15259ce9cae7f13aa71daf42f0dee4dcf538121e95958f1195719118e1360ac78cdcd2deb43302e96745f1e854806bc59786821b5aeab053a7b875c174dbf79d0fac5e752c8e43a08fbe68ea982e0643b4c0b86933c58745d7eac3a60fa2aa885b918e7d9881b40600179155a436ffb4547853e94dee7cb97e2108e56cb4b4d189496a7adef010d3251302f1b925a9106febf29d6f833807c62991b449fad2a08537ef2c572f0fd3abf21707b8c8be1c1331b6f0823ad93dec10f45c10c6ff846ae710c1185ece606905cca943609c8a9fc29462821929823ec38a41178999fc3290c39e87fce7036a7abb47e2eda1d94d7b5585117ba4bd22610fba6f63fd6020d68e8539b1c1fb8fcda7de076f0ba64ad73a04ee47b389d130c4e3cce40f706bbc71a88c40be156032fea04ce9c209d0698d14ef95751cf9dc857c345a5828d58a979c54c018bb205d887a54bdda0ccbb9ea0f6e81c651a4df1039fc65f5b724c886cc899bf73d5eb37cd329d7f61b4b21e7bf10ab35028e32dc6faef0e38cdfdf3b2f3090e542153245ab52744d65785358a4841985edc7148b16e7734f5f5aae60931589762126a37d2afcc4dd1c7bab29ebf0fd2ca85ad22ba38df7207e45b69141c66aeb03353667864eaa859d33ce0c768ab6475cf1d04b4b5e61807602ddc03e3e712c9f61635dddd6fb7fee5723af6a39b34f89d2d0dbb359d6958f03a1b87cfd71afe6ffe749ca399ab16a3857499b8a83ed73ef42b55c9e87e3dd55b15b92627b5f65dae7f796afc1b66346b03443b3e9d69ba3700a3cc4b9b6cb7b3d475bff116d226c172478204797ecaecd9ab8d0a3806d27036fc11a072cff2268a3b4e75fcc7d7f44221118d142faef36e71c6208ad8caeefdc6e0934af72f81e00abf213849c58802b30e00ac68b0351ea9619f0e48d0a8b03ca775a015d11d6d87522d7ba15ac2fff2344fdc6f410131794589ccf5e1bfa498ccd975d38bdfa18c26da5033cbffc27dfda8dbb84f6999fdf30431459244e1bc44af38c1ee6ae38db669b896c7ff4d204710771e061f56b3fc16688e2c9031797d8b99bf526465006993986eb8be9e8847c17f2a8b0ba923aa7d6af8bf7f4335a91391f1c41591861ea58f45689bbec08bd3b02839fea13ddbb9c0d8e2955290f2039bdf9041a4ebc40aafd41065ec7fd2a76930436c0b268c7a3de9f937bd193dc1da7b8b33d52d46aa2af103adee1673025bd77c66c6d91fcaad9adae3437ef051851aea760df635d202e0dbf9d902947db3e8fec7532f03167308e68de0c6f8b4833ac05aaee4f5622ac04ea82f568885166cd06fbd63706e9296ef4cc69eb893aa4ebcc96df91204fca1e1188cd7364c3b2986a95b9296da2b7816f8c5bd6d0ce0a8b5431c8d0601595399b69e97e388868f4723f42ccf4fc8950710b1bb977b056dc8ec28870b93797af96462e145cb5d61790402240f3b5d1e1cda79d668bac86486f41fc689592d9e4c25f8a820516c652ea5dcf931821b5f626d4f74a6a4da105516028525ed83b6ef18733000a9028152ca374787f9034d011d20211d3bff596a5ff3dafda778ade76dd360b2e9d77e0000cc8ed5858269e62e02b7fef23f30329220ed00d5c00b485a5dad7a0bb7ba85edbb4935d33bbc18dc9da64e30e96b9bd33d132019e99ac959d562ca71334e2699063cef2e69fd3184a541f6fa5408935baa0cd96c35698b316ed72cccc259422a3b33199cddc78fdfdf6d6a80446aab66b31ab4cf24f10019acd4bd1a7491ded3ec7d2d154a29fb49f3460d849d58acb4ab47594bf023570702e50b73eb476ef9656e11d7895a3a9efc2fbabb9fe8411b9129ff5f6e291dde58777f437217ce20f213cbbb9ebfe22de23c5859135ad011329363ea19e25faf8d97851ec2e130acc9fe9b8d7cb0472191f1bb996954e5b7caa0", 0x1000}, {&(0x7f0000001840)="bb0c9fa668e29c658b6514829e5868a0382d2ba37d7444db9c939287eb3365caeb04a4ef8e8baf1a782fd4cffba6c1ada3a19aea4fb116eb47fb29d97f54e5a74b22045c6f4db7602dd8a6f9ca8e5e02e2d187721323a5ecbe81fcc64de6191f6daa209b194351d1", 0x68}, {&(0x7f00000018c0)="34cad68706104dceaf5e28b1e6add0502171051c7db9c069e173ea1e694232fe95b73028d70a7fe0dfa488415435ec8cb8e2e057d698d22ba07bcb23f16ec869171bb6ece1df701da6bb79b5c2a710dbf378730e786a72c775", 0x59}, {&(0x7f0000001940)="e425929cae27032bd88522e39bc68460ec275beaadf814240e387681c5c6c5dfe85a7ec53d02e22c7f20f2106b25128b8c8bcd5933d49214087514a902d7bd19fbe359e8dcdadb383e849586760f23ab00eb7f85da0bf78507ec5e25d3c4cfe1aa09416f8bb96e4fc52d585419953265bf708f3159f5e92a789dbb15caebf9b3983e11327160785732a869432679ab4c11ca8ccc81f671070bea50a5e825fcfb23edbf4e8b9cd26882059badd89a0b828204638f46359f96924f6aaa7b2a6adf6c6c9a8b99564440d895965e0f30a3d38a04166f12b6d01ac2a1645443aa15bb8f7bcff2c8a7104a54081c786c96751f2c84ca7276f1", 0xf6}, {&(0x7f0000001a40)="6c10def4d2873c0f04d24b0f0d1451d5084a5135e0b4bf61908c45b763f7271cd99eceb759e0f9f1cafb4768da0e5e4d0a8269c7d24a6237950e290c974dd34fd727f4f67798fed2fa8533c844ac1c6e431311d9bd", 0x55}, {&(0x7f0000001ac0)='<', 0x1}], 0x6, &(0x7f0000001b80)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x30, 0x117, 0x2, 0x1a, "7403eea4873124dde6eb9eb4f546f01c5830f58365dabfbe4c07"}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x55}, @op={0x18, 0x117, 0x3, 0x1}], 0xa8, 0x40000}, {0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001c40)="3815f3225c6ad797b67f4739bf029c5387aa8b3b634926fbb1d8338bedf64c3a34ea55fa2c4155276796730bed3beb8cfb9af2ce5ce8040162ab0f39a014d3", 0x3f}, {&(0x7f0000004080)="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", 0x1000}, {&(0x7f0000001c80)="ceec0728132cb2fea5854bdf29a84934bc4be0bbf4593e4e120273fec16ffb31a08da9f101e1c23f8e6d8b689419b894bcc1f39a28be212c54b96322918608311088fd6653515ce0ab70eca6141154102dc44affb7d00f38680609c0d2b3c94f79d93caf2484e706db1caf2709fab625278620db3df391a5990585dd987594640a5cd002f86e66e6d0252d6d4625e244114d5b15520cf991f5ab4086b62450", 0x9f}, {&(0x7f0000001d40)="a30d302c0cffbefa9bdd6be9e6ecce6f00afe6255261d49c874ff6c9d593ff4e113fdfcf9cc9d27eeb70168d004709f79debfe55a0e5e3ca14af1c97530b7ee6f10ad4bffd5ada1327445d1d9f210a31eb596657c7f5e61f7e20db50e2b0f9eb12fc935a62826cf8a324a2f2a63d5153681c19e31055eff1cd45850cf74a4f7a1bcb19826dbd107ebba048d283baaede17abaf2e6e999833beb64e0b8dcb0b11490d20e57a34cba2db652108ca296422f2612727ddd174d51b85c33d016b6d12e479ee795f0d38fe1baaff57887a72aaa75da681ce38c05a6e08d5ad1172d04a1e60", 0xe2}, {&(0x7f0000001e40)="74b5ef53b6bf6696aefb864f2326f8a7dac70e24a42b6e72f2c289b97c9554f1dc269f1266c59edc65ec551034f78736db7aa6575fd18f0730a1", 0x3a}], 0x5, 0x0, 0x0, 0x24008040}, {0x0, 0x0, &(0x7f0000001f80)=[{&(0x7f0000001f00)="90fdd1211f9b00fee4a16933623688df50f53e258ac7f2397e92f2eb65eeb4e74fe3f644a8a3b2e6c6f7aaabeac9ea816578aa2949ecc87d2a30447509320cad8b0bd2e83a86", 0x46}, {&(0x7f0000005080)="88bcc701d9335112ecf6cb6c942df26e0e647ee80daf87350b3eee2d6035b232cee7f6f0ccfb55683bc5c6921b240cc5759c5af2851056b9c031363d402800a898166b4a058eda258356c0b4452e0d71bdb64dcdd9d22dc77110abfcdd1afb8928081c9ba93e68c05da64bc202218e42cd34c3e5471e1b1f8f2d1811e53dc898a6", 0x81}], 0x2, &(0x7f0000005140)=[@op={0x18}, @op={0x18}, @iv={0xb8, 0x117, 0x2, 0x9f, "b60d89714ca48d59e32f60e5198eed553f280435b8df8e11f729cd615a88b42fb6c27bd791caabec9f2383d4c5ea22f500df2f74d1c82c6023fe8e66c1e343f5eec548b442827046a07eab41ec42e2f57595f9951ac0e60edd9121138d99d29566aa5ad1ee3de23915317840b59d11297e55b5e901a8765e89bd5951139edd8a7f5ab3002fd337f5b60b7b882b80feecf55689bcccace1101f65338a7dd4d3"}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x100, 0x20000000}, {0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000005240)="e033cf3ef9ec7e8864e99f301474230639512658c138d219e75c40ead7f0cb4c45b09db537071fc74ad7ac0259916402110daf594dde7dd0052c994feb31097e33ee07f2fcc8295a15c953544e27663a7875b8ebecb29b8678eaac", 0x5b}, {&(0x7f00000052c0)="feda5f3ca20860ffe686aab687174f6c6631a30e6bfa8479d52275cacc3e60dbf3da423a5b981d7b4f02556d79a2f46e47a3b9d433d5057fa842dd09345f96e6b3e571dfc8a7cf4b85caf11d519b60b435f1f3a394c97435", 0x58}], 0x2, &(0x7f0000005340)=[@assoc={0x18, 0x117, 0x4, 0x11dc22dc}, @assoc={0x18, 0x117, 0x4, 0x400}, @assoc={0x18, 0x117, 0x4, 0x7e}, @op={0x18, 0x117, 0x3, 0x1}], 0x60, 0x8010}], 0x7, 0x40804) [ 2028.087758][T22275] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUD*%I 3 ymħl_pf/i [ 2028.087758][T22275] i: 0.mC0w[:YH [ 2028.087758][T22275] #<^)Z4<] [ 2028.090457][T22268] FAULT_INJECTION: forcing a failure. [ 2028.090457][T22268] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.131063][T22268] CPU: 1 PID: 22268 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2028.139757][T22268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2028.149809][T22268] Call Trace: [ 2028.153108][T22268] dump_stack+0x11d/0x187 [ 2028.157461][T22268] should_fail.cold+0x5/0xf [ 2028.161972][T22268] __should_failslab+0x82/0xb0 [ 2028.166736][T22268] should_failslab+0x5/0xf [ 2028.171208][T22268] kmem_cache_alloc_node+0x35/0x680 [ 2028.176469][T22268] ? irq_work_interrupt+0xa/0x20 [ 2028.181544][T22268] __alloc_skb+0x8d/0x360 [ 2028.185870][T22268] ? netlink_dump+0xa9/0x7f0 [ 2028.190463][T22268] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2028.196366][T22268] netlink_dump+0x428/0x7f0 [ 2028.200892][T22268] ? __rcu_read_unlock+0x66/0x2f0 [ 2028.205936][T22268] __netlink_dump_start+0x3e0/0x500 [ 2028.211221][T22268] inet_diag_handler_cmd+0x1b4/0x1d0 [ 2028.216516][T22268] ? inet_diag_dump_compat+0x1b0/0x1b0 [ 2028.222112][T22268] sock_diag_rcv_msg+0x223/0x280 [ 2028.227067][T22268] netlink_rcv_skb+0xaf/0x260 [ 2028.231814][T22268] ? sock_diag_bind+0xa0/0xa0 [ 2028.236508][T22268] sock_diag_rcv+0x2e/0x40 [ 2028.240929][T22268] netlink_unicast+0x390/0x4c0 [ 2028.245727][T22268] netlink_sendmsg+0x4cf/0x8a0 [ 2028.250509][T22268] ? netlink_unicast+0x4c0/0x4c0 [ 2028.255508][T22268] sock_sendmsg+0x98/0xc0 [ 2028.259923][T22268] sock_write_iter+0x186/0x240 [ 2028.264765][T22268] do_iter_readv_writev+0x4a7/0x5d0 [ 2028.269971][T22268] do_iter_write+0x137/0x3a0 [ 2028.274574][T22268] vfs_writev+0x118/0x1c0 [ 2028.278924][T22268] ? __fget_light+0xc0/0x1a0 [ 2028.283530][T22268] do_writev+0x203/0x240 [ 2028.287773][T22268] ? ksys_write+0x133/0x1a0 [ 2028.292286][T22268] __x64_sys_writev+0x4b/0x60 [ 2028.296985][T22268] do_syscall_64+0xc7/0x390 [ 2028.301519][T22268] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2028.307412][T22268] RIP: 0033:0x45c849 [ 2028.311314][T22268] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2028.331023][T22268] RSP: 002b:00007f074b93fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2028.339437][T22268] RAX: ffffffffffffffda RBX: 00007f074b9406d4 RCX: 000000000045c849 [ 2028.347441][T22268] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2028.355408][T22268] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2028.363406][T22268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2028.371384][T22268] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000004 [ 2028.371784][T22275] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY 04:33:04 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="c00e00001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:04 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000000f703100025bd7000fcdbc1250500eaff044af0a54ae6c9a9e12e2f6275730000"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x2000}) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000080)="0228c61d2b81f8e26ca8237f5a3954d38c1208198e9d2ef820237f261dd324f6acd003e05ce55981212474b081c49f0867132fe9efefd63ab21d5b6cc17169533250392e480000000000000000964c7b57c38036b1d8d95e822e75a4632546b8209441fe856e8adf5cf1c8470e0f1b3d93ed2e0d0696d2be50c769f4c682beafa59f8886d2f05ffe8b2aff6976db967f43d9322843bc8b78bb835126f1e4e54dfcbfb456ea54e20ba9ca086867436f975440d75574ed868eecf142325c6ae4b42aac2a12c9ddab7551a26b8efaa8a956cb1f6d717e4f0f86eb8f430c0791ea2dda9285a5fe56e354350b11577d4f7d76728f8c86f07718881f044bcf1416fd8fdea9ae745367d0998f8a0d8cbd9a8b9310fdd230450000", 0x117}], 0x1, 0x0) 04:33:05 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x3ff) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) sendmsg$AUDIT_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x3e8, 0x18, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}}, 0x20000800) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x408542, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x10, 0x3f2, 0x10, 0x70bd26, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x4080) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 2028.371784][T22275] LLnCq2] [ 2028.391528][T22275] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2028.405386][T22275] Error parsing options; rc = [-22] 04:33:05 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="e03f03001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2028.600194][T22301] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2028.600194][T22301] i:0.mC0w[:YH [ 2028.600194][T22301] #<^):4<] [ 2028.642951][T22306] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2028.642951][T22306] i:0.mC0w[:YH [ 2028.642951][T22306] #<^):4<] [ 2028.665217][T22301] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2028.665217][T22301] LLnCq2] [ 2028.678791][T22306] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2028.678791][T22306] LLnCq2] [ 2028.693129][T22301] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2028.706680][T22306] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2028.719849][T22301] Error parsing options; rc = [-22] [ 2028.725289][T22306] Error parsing options; rc = [-22] 04:33:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380), 0x0, 0xffffff7fffffffff) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) 04:33:13 executing program 0 (fault-call:3 fault-nth:5): r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:13 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x60000, 0x0) close(r1) renameat(r1, &(0x7f0000000000)='./bus\x00', r0, &(0x7f0000000040)='./bus\x00') r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$can_bcm(0x1d, 0x2, 0x2) r5 = socket$inet6(0xa, 0x3, 0x4b) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) connect$can_bcm(r4, &(0x7f0000001ff0)={0x1d, r6}, 0x10) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x19, 0x0, 0x0, 0x0, "0727e1b22b5fcef700580f02000000003f42f60000000000b2bdac3fa80acf584ecb5fee496e6a66856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x48}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:13 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580300201400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:13 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 2036.531578][T22319] FAULT_INJECTION: forcing a failure. [ 2036.531578][T22319] name failslab, interval 1, probability 0, space 0, times 0 [ 2036.539597][T22320] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2036.539597][T22320] i:0.mC0w[:YH [ 2036.539597][T22320] #<^):4<] [ 2036.584142][T22325] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2036.584142][T22325] i:0.mC0w[:YH [ 2036.584142][T22325] #<^):4<] [ 2036.598005][T22319] CPU: 1 PID: 22319 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 2036.608951][T22320] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2036.608951][T22320] LLnCq2] [ 2036.613915][T22319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.613926][T22319] Call Trace: [ 2036.613964][T22319] dump_stack+0x11d/0x187 [ 2036.634681][T22325] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2036.634681][T22325] LLnCq2] [ 2036.635527][T22319] should_fail.cold+0x5/0xf [ 2036.635680][T22319] __should_failslab+0x82/0xb0 [ 2036.641465][T22325] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2036.643196][T22319] should_failslab+0x5/0xf [ 2036.643228][T22319] kmem_cache_alloc_node_trace+0x37/0x610 [ 2036.655038][T22320] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2036.659146][T22319] ? memcg_kmem_put_cache+0x77/0xc0 [ 2036.659228][T22319] ? debug_smp_processor_id+0x3f/0x129 [ 2036.659392][T22319] ? kmem_cache_alloc_node+0x1bb/0x680 [ 2036.666420][T22325] Error parsing options; rc = [-22] [ 2036.677060][T22319] __kmalloc_reserve.isra.0+0x43/0xd0 [ 2036.677136][T22319] __alloc_skb+0xbe/0x360 [ 2036.677229][T22319] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 2036.684959][T22320] Error parsing options; rc = [-22] [ 2036.687370][T22319] netlink_dump+0x428/0x7f0 [ 2036.687468][T22319] ? __rcu_read_unlock+0x66/0x2f0 [ 2036.751995][T22319] __netlink_dump_start+0x3e0/0x500 [ 2036.757220][T22319] inet_diag_handler_cmd+0x1b4/0x1d0 [ 2036.762511][T22319] ? inet_diag_dump_compat+0x1b0/0x1b0 [ 2036.767981][T22319] sock_diag_rcv_msg+0x223/0x280 [ 2036.773098][T22319] netlink_rcv_skb+0xaf/0x260 [ 2036.777785][T22319] ? sock_diag_bind+0xa0/0xa0 04:33:13 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) r1 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r2}, &(0x7f00000000c0)=0x18) get_thread_area(&(0x7f00000002c0)={0x6, 0x0, 0x6000, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x14}, 0x2}}, 0x1f, 0xff}, 0x90) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 2036.782491][T22319] sock_diag_rcv+0x2e/0x40 [ 2036.786910][T22319] netlink_unicast+0x390/0x4c0 [ 2036.791756][T22319] netlink_sendmsg+0x4cf/0x8a0 [ 2036.796571][T22319] ? netlink_unicast+0x4c0/0x4c0 [ 2036.801518][T22319] sock_sendmsg+0x98/0xc0 [ 2036.805906][T22319] sock_write_iter+0x186/0x240 [ 2036.810693][T22319] do_iter_readv_writev+0x4a7/0x5d0 [ 2036.812289][T22330] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2036.812289][T22330] i:0.mC0w[:YH [ 2036.812289][T22330] #<^):4<] [ 2036.815906][T22319] do_iter_write+0x137/0x3a0 [ 2036.815950][T22319] vfs_writev+0x118/0x1c0 [ 2036.846091][T22319] ? __fget_light+0xc0/0x1a0 [ 2036.846960][T22330] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2036.846960][T22330] LLnCq2] [ 2036.850695][T22319] do_writev+0x203/0x240 [ 2036.850732][T22319] ? ksys_write+0x133/0x1a0 [ 2036.850760][T22319] __x64_sys_writev+0x4b/0x60 [ 2036.873304][T22330] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2036.875589][T22319] do_syscall_64+0xc7/0x390 [ 2036.875620][T22319] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2036.892932][T22330] Error parsing options; rc = [-22] [ 2036.893183][T22319] RIP: 0033:0x45c849 [ 2036.893265][T22319] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:33:13 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x44080, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000003cc0)={0x80, 0x0, 0x20, 0xfff, 0x3d, 0xa7, &(0x7f0000003c80)="9ec896a5443a1be9f013856b8439571b917eff08a8d6dfb6b6b82c035b57167170ce6b3cf084df43f2bdb139b9a8ff52317f66a5168efccdb485e3a6b8"}) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) sendmsg$kcm(r1, &(0x7f0000003c40)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x80, &(0x7f0000002700)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="b8b06f6f5483edb40e482cf9c739f829c3d449c7fa171dce52bf8f51f7f76e36082ef0d155512c7fc56c5904f9482090672e25238db0daa79e04574ea8606519592c610e7fbea038568878575699e3051983768c62ec20dff4fbb6767d7d1f326f2a4129c8e6b30546ad6a8bf00f6e2980be494c738bee79de57d3c7967854268c6d63264e5083585564c5aa667f78fc8d841ac5b26a6916dd55afe214dc3d5576d75d27ac700b0448a4d4ede30ee631d97fe9796f5ca420fb9a92677d2ec42e59757498d6cf1fc0acc2152a56431b2956e6fa418f52bfeb6f", 0xd9}, {&(0x7f0000000340)="5c017c2886dd7ac68ad42267263ee25c02d3b01f638faf9cefa92cd8f7cbac31317f43e00823f4a991f0d953bb3b1ab8f3ba92d54bdfbbf95ce7e504a60b38d9803191236c33fe8cecb4b8cfe04d0a85627129b5a521a415137dc5fccdace2e88a2975ff47eaecc3567cf1cf22bff64d0e3221ce71e761b3fe145e7c81e5d627149a6cadf77039b728095547154e451fbbc59d4bad1dc0c1ec07272d337833c8f7668d22d61ed048a1e7f0a4fecb938c0fb06abdf7dfe2f7748cabb67717dac2ecb9f76fe48fd31260fc5eb4ad79ae7d79420be27446208c47b166439a1ae2d35dfc5a298ddbb01a882cd1a608498be11ca0d26495f5d80d36802222ad6329bfcb3b37300a48d2f5e751d5a605c2c804108a11abb68dd474e998f5d7ca6b2b76aa8266050c772f32eabe071d4c02b31397c62099f813ddf81fd0e9f33f1bef967edc11814f09dfc54c5b55c1c73e9a340ade42a5f1ccd589a27347df285cb6334fab6c341af6f5d2ad06f6d4133620e703f8f0e137bbd8c9a87d9efe28d8f75368b60cd97ee057b636ecc96cc5addf9e600cc42f81413833cf45d8a807a5a03c1729fba67a9eef15131886ec998c7c2d1117f7f550fc425ef97c8f8fa8551a3cec75c9c3e959ed62b515c4013fef6f315ccfbf11f25a1b35fe81db53af64ef2cfb99747b0cb670e972fab7acf105a6d3e2cc25dbe7d62824a677a5affddc10225a70c65ed2f81b275ebad97886730e903f4438c4b4250e845f5167b2fbb4a4dde04ee0878313b481e4f49c3d7b9f590e8591b44085f5f19f8f8ede02b8df6a30415bf5790e6cacb3c73f9095b5544645d999066868494b6f180c46c4dee526f6358707c8836c935f5ec4db6e1d0bb8b80700cbcfc3ca92e57bdadeeea0c068516647d8f8052c646ab982d05a3a4390ea0efb8c58b939dab39d1bf17078fd865fcff230316280cd24e88715b8f5122a03ae41dfa0c71eb40392d91554987c75065686163edf3dc098dbea4bb14e9ea3296e0d433aab4b0cec77139246e6161783cbc87cb6812b12443f54c8f1a1f484abf199e42298cd785cf09a27ea2425cd9d396feefbfab81fc90b961ba37b91681fd2c52ebe3db5ef90b4097150906035fa4936b31c5488376f80be05152ba9321e1fec3054cea4a0fc334b3837575d72b70bdfba411c351079cb6035e64b43c186d013c08b6ee77ae334ea613ef9df13118111c911b03a3e32c0edb24b87a7e937814633bd5658e07cf8539ca5da4981633b6e06d747f3fc7da383f72bf053d3ff1886e0d00be224843aa3750f7629d90ec71f7ddb6199ff260ff2ddb9ae1331913e119821fe3709709830663d14ab457aae1a76fa96bcf0610989ad288bb96479fe46684ef9b807681579e9748946f20bdf7be7c21b020143d8408057f3c5b4789090f7fef7ba5fe18a17fdd09641319cd4ed3f5ec087e38b757786c177a152deb531653ff83c1619459b26c3f995cd55949b8818172a17a5a5790bb140ff9191c90847a67770be36f05c12b4791bd52eb794673d0a3e8d12f6eaf7293cfd30558330bba1184459b6f1701032c25c651cf7977292838a0fd89d0d62e8b1076f5255bad67e36bfbf9e83279fae002c84ca8561ceb6d00ad9c57194911745345706f4efae8bcd38928c0c8186b00a5a84145a0dffef3cb796ecc3cb392b64bc6fb3a8ce87e524ac08173256b7bc9ed50a661845da1b8d91976835739e8448cd644c7a79ea39c529a16c3be7774de8f30acac0d63f6d7a5d23c0ebe5d323b71a3000066bd3a1fcf5b69f5fcab1f8547a25846ac0c15a7ec5df47699fcff2e2c145e0deb48d067d758a75658acb1f3eeca7a865cc6f457db8d4f103914c75629cbe3c62d8d6346323178fb838bff2c758825d5946bec9d28ab5fd8ab94eb3a9fdc6c7c79cb6ff0a839b7dad1ed51c4f0a9b6ac4722cb55a380d654c0c148bc42b7b38e12555b048731bc3e10f5ef349e701b88909d72b066d2f405d893dcb58324aa4b6b6b69d5b70060d10a9cce975b7eb62e6ae31cac1ddb25eec4168d2f4cce154281a986ed7b69acbd7250a320a78cdf1c471df382063dfc905e5a23f63880c8bad4b0230746e0e8fbcd11978cdca319fbb8051312cc2a745ef331268a1bcf22351a1a64a509fe15e6460f54a4d9029f8208346353afb1cc5923c83600c860b639602e2bf9288357778d0dce49e283bf3fb54ae24c36ed694ff13b257d8a265a6efce1a69fd8421ea6bec05d6bb54a79eb8499af2376567efd0398fb3b77bd013ed5144b683316b3f14888ae5f5da9a9bb406fa7787ee0e10f533e04dbea1e9519b2ab124f17051530073cf0d20918010d46a3d6ddb5f19c13cecc09ff2db78cbc0d0af4e9bc4a41f9d6f3db6e62e6101381ef3c1dce883fdf708d309e7a60c6e93a150490e1a93a3cffc742b2e59e8d8ec9bad1cf9e68e38d93a0ebc3979cb23ab9bf015f8e00263f1a594a26be85292ed7c02d23b4e337f244de85eac25d0268e690c1e6abf4eb3c675e31dc325d14d315190e302e78ca5299d8b5a06bd44d1c6a8696be243134f1c4af9213516ec24a9701e705029f06bea165425b20274b66de58d734e65da117b76609b4ae36d267c2e3b95c620450cd03f0fbdf0ec55ae098cea96e8ed05c6b98132e32ddd003ad3afacc37c6278d5dee47a6ca63aba784f420d78ec1263749ac1531e39654a4e1d0b6f2fdcc66254e44de831a9dfcee3e8ab9ea191f2efd1f9fbde87f77439d2117f9a81d851c12fd9eb23e7b4adf5289eee1efe447766301ccd2522138310d1e1bf56aa821c80e0afe3873856aa92c9fd424cf59014aa7048382d58a33b31542c82c6f68327205fec2e70ecd5b58c0948a3195d43425b4329f0375d169888b6d5c033cdfb1c1e3af52e47d7e9a47afa68cac0689a9db263cb34cf95d3d3ae0943a6e189cfc10c1835be895da942a19a70aba193de5fb8ac3c038f22efe4a22f36bf16ba35f5aaca448edf02573d06bec723788b35a87fa96dc6895d4e1ae4763150c1259204b397033de23e6a3941963db66e3e4bb2d9f1a5bbc91994e12eb5ccfe66d0e6c2a663874d182bc19f0b391c38746cb3feb1cd41ea23a386517d862d829dd507f8e2bf0a88af9603c888272456361db24490d6b763d018c14f48aa2e9965a5ec53875b64fc1be3c3fdd4acfb92e4481bd36f81537ff1a8cad7ba66333baf2755a9d6e65d09d71f331c07f225dbd162bb2747bdcf2ae5571a36b7c4283c64f546c73f534bfcfa1f0323071b57260a42e88fc0ed376a597631d17c669515e6b94f29d68c9ddaf0090f9ef65aa433bbda6ad125fdbec961f445fcd48f16737edce211dfdcfa24613c47c00a319943dd817a84a9714028aba227288a370f58077b72c24ea947f9208f1a92ebab1f9abca468a553cfe1fc5e1754575eea075b26bf673c1dc407fae17b1b09979c9b5a72b536c1d422dae8e9620f2ec5886758ce3b8df80a810c51a7148fdcff8712171985c30cbe9c403c6cdc7403035bd6d01ab2802b1a6fba31cf76537cc798ec3c1151b850c7221cb81a55490e4cf2b76ac2c10e7d2853ce3bb19b8798baa311d2dd411a447bcfe23b90cf946dee1971bf5daab37d5620a9f2119904105f55b3463ba86cadf75b21701e0da214f4e8dbaed08c5e686f70d0bea2b020c39b7aa9e10b77cef99a1fc4cb32934540f322dd6a2a3f018a31112b2eb536a9d2061d322fd1c11e3d5508cd328278d4cf76dff1cd10d99d98be9fa087ff9546a122f301cfc0a11925261add178ef463c99b2f5100248b6674be888e6a5a085af6f1ce95a8ee041e1fe859c7971cd15fbe39ce5bb214a8aae08c19b0b9ea41a015ed8dabe0e404e30ca2784795aef52e745231d7d43dab8a77a3c2d9237bd616b59a4011440e65645a1cbf2b834b645881329397530cf8145fb44e7035e4dcf45447692a2cd775bfc04a6a3ef2df37ec051fe726aea8e439fc03865791d294971c941370a8dd0fef44530e837a0bd3e84dba8eee18ec28fcf4085c583d53e20b77c0f07bbff6ec60ceeac3efc2676d88db29cfb659096021a4e0f7289cea66af4c3319feafcce6674948003b1086cf6d61972e5a972517885e91a004c751869bdbebce05fb0ff8685e85f509fafe3167c308b808e88910cbf0b1c4f4cd209d9259233f630ddb8e5d8b727c51ef5ea0052f8508411484d016fefce37e29d3649169efd21138338f2c5452cc415c5b116a2a4dfde5b35c57c632b6e9716825c9881a2072cc9478a551dd4685be383acf2d75a0a19c380475a1811e24ba0dff676df01ecdee0a0842b9e8818e365997f30abaddaec1f967656dc94157bbe5066f14ec8c32ff3f346bf1f89844c3c46e47989a786be38a5a5d3b09b30e4053f05e4fb0e6a7ca006aa479c317251472929cf05769785b3d8105698821b8ffa05dee06427e3aa1939a23a59d73c233b96b7ed39e65a5d85b598063be69f2f34caa8be0ccb74a74963f92c480bab31123d5f49a90c3c77cd6876e61d8ce56b4acaa1ef5023db19a14605709650f768f266165de867c01aa8e4ddc198e9c9eab072608720c4db73813d6a30e6b06ca1601a2a7340849e0a02212d127ebf3f25441f1a2b38d1d4fcda655757ced4c9300ff5c8892234a7272f01fde1a1066d5ef194095c61f4336498a3d22958adbe6bbd7de5f25a7bf798003b2b32346023247219a3709f848898fa5fd4b72104189ed6adb35e4671e63063cebbee295ba72673e9b84fc32db89aff2f0bfb858c9df928bb749e082447efbd6f87e032d11875af84e87f138c094a433b240c5b4f25faaded84af4252aa4e94a78d420a923cb54054d039b68b1d54db66b48c4b7cced6cfe1f93d99a5aa66360be3b86cddd12f06405e06b5b803e8772c2e73c4b9bbd181c1a33f91ed2f40aa37482fcea5c3712798d11b2129f7ab07774b426628fd8ae32d7936a093aa74e5d2a5e01a00c0a9167873d8220d64edbaf1b7a2face1fdec52735865bb45263856b620662eb14161219defe1b563ad804e7f7d698c8db8c44eb946c44b27854ace5b5320926e5a108e3b70c9147ad1b2b392df087512438ea232046257f52d3cebfcc47d28f9b2f11233635004d9eaf87ee23c9c291a79aaa20ec8fa9dd377c2b4689240d67c83ec91f2253afe5032880419b26784bb48e0f2ec5941cfe6828d0b982009060cae45b14dec3680572ae41db569ccb9ede790c24ce69e13d39560a713a65178c60c415d5c6f43bf4224a6cd0537ff9df3f2858201f538d4d4dc7b08772c705e049a5e750b207678597487a4c7191f70ac90f07ef861af18b778d609f7d8739054822459bdb75f2154af3d8eefefdfbc541d2d675b21cd45e75225631e7d53fd0396a99771685ba36ce03a99aec08675a44068c3867c765eb70d3bcd2a980c062a39c0ea562b5211035f9820716abf275d845bb2356f7812f41af3c485b9cafb6866858044e59280a6c2d4916179b1cabbfab24e9ac5879a764cda175dfc4c03fe0a92eb38d4e83dd31c02ffd7fe1c1cbd375acbf117cdf977d0353ab83df869b602697b2af551895876278b560a304b90f91821e6315354e45e67cfdc97fe872b55262b474918799d83875066cbfe1a585897f9a63cf1873e3dfb9f4b086511244eead409f32ef868780f2e483de163beae7936bfff46a01c42beff78e7c2433b00963e8293c961ee052e4152bc903f7dc08144ec9652bac7b710fcca76bdbdce44823348c67d4e846fc5e74b5bc8eebb1bb2c3ca6a872d9777", 0x1000}, {&(0x7f0000001340)="aaaae3acb7baf5d4398f15d96785b08251fa9bded96b977dc1358c", 0x1b}, {&(0x7f0000001380)="c37f730bcb32eeece2efb88f4e61d0ca0e3fb566acf854b9f8d8aaa1d7a7df198bb2c7a7630b1d1b503d7c7bea48f69a5a95c688dabcc2584c31fc200fc31eea5e53f8908b76cdc6953bba2b47ca2984c71ac0b30bad45a59c808d4c47b79461244fd4322afe810c4b8437362d3fdcdd490b78c11900d5f835f441e7ecf15f37efe2a7a27b9e44ea8a1fe03b41bac6411551b38d205a0541d72d4bc2157af684a74e5244ed11035fc623f67f9ecb0160736845a0b02bcbc3e32421a69d", 0xbd}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="fa0ddc0e815086bed868d88233a731a317be0eaa576a6ca9553fc806fd8d70a66db7c0498a541a5590d9e0d031bf4e1feebd04bca50d63e8daa3eb1dd7d26eaed064be041956370421ea70467fc3ce461ab05d6bb82152919f2a6bf623d9085627d71dc2146ed0d2cd98a88eac0f1e86b4de01ab350d8b182c61e93387ac76b72c2ec8ab4c9054c0f8f07b9b109bff0658a4b056591976c20885357525c4700a30a2c01ec3d32f04c9d0ed3f9ff5ef85", 0xb0}, {&(0x7f0000002500)="4f09a5f75bf777b0247502cfbd1809e64d6c26eba3d8cc876cc323567b93c65b7e8159dee49de9e8ff0002d9985c11974d950d67364918bc616318cd1e777542bce1abce7d0a1d97aa5f28a5d4de74f05ddef2a2a2eed4a3d8051755fe1d5c31773433a462d988ac7e8918ea6470499bdc3dd669cd16acb2603e626c000e25410fd4c6e64af0347e1e790465c16b6d07e78b864592532b3856149981d85f033562b3ee1892e250094fc190aeeb02e0e103df5605c571920bbc76b0d462c03084e751430fd6a253654472acb9277a9608b6c5a565238495d3610a17c1821ba3f3a2a7dcb2", 0xe4}, {&(0x7f0000002600)="89cad4740723d93d218ff45f804a4487e474bb34ed6ed315fd733cc351b16ca664600ba5ff97a1e08cf3d91d5cd77f7a03700fe2de5f904b3ce578804f5997158b3541ad1a5652fea2e1b612bb5a98e48257b380d1a80931a052a878041ad993d6d3650453ee2db28cbe625fc87b0cdd06af78933082b513fb9ed15583aacc083e8d8bb401e4a8ae37ebb4cc74cabef2ab5056f0b8dd2c66d67152c7870313beaf45e1b4ccb2c5fe06976335e445a11ed38452df243c6ab2f18edfc6037666092d394b8c4a7ce53b12b7b3", 0xcb}], 0x9, &(0x7f00000027c0)=[{0x60, 0x117, 0xe37e, "ff5a0439980949e656421a817a0e3b6c989faf82239703c0cca7e57e53aec3298e40c66fb3aa3378c592e7daa80cf9dfe0d41ddd12088da2bb21d336a9dab147f11f75b07e084ec38a1446"}, {0x48, 0x0, 0x4, "116f292bb475a38cc1016535893968ad8a1d869a0b8e58f68876cc40484a13b19cd040b472fb0254fbfa2cd5c4e0cd59a81b248a01"}, {0x88, 0x100, 0x401, "c8558a33bb1102956359bbc0f2bd027cb24851498b9b6068c5bcf95c76537501b0e12f94aa042cb84493b111b3a6f2ac522f8914eec3b36b7fb9fed01cd01f125dafd2432708bae84332b2ef6339c932acf7b302b05b0fcf808169f24a0ae23351a08b67d817b247ea589c8679a63a5c54e157a310"}, {0xc8, 0x107, 0xbb6, "e665675b904ed522b689d42ea19c9b69823714ec65de3409bbe16bffc5c744b45125961d3d5bfb1171c325262cd3993c8ebd01b53a8830b60c62b2806cf4b823264b45cad92a55f0e33871b059a7be2951a54a7e5a51676788ba1f0cc9b7a2de08b6af81fb9d6528ffae14d3dd8510d7648eb01c92495b7b771a4cc54215dc08935e17493c8c267789ea744f27de1bc7ec2c134805dbb3bf313a3af62d115e90a7e194c881d8e8141590720288b6aecb3881934de5"}, {0x38, 0x116, 0xfffffffa, "d892468f165be384d3d764f3a38417b19d00f5b4c61c480baebfcc6ae841c6dd7a6915ac"}, {0x98, 0x111, 0xdae, "3415100367145e225a7924f7904c0dbf830ae6b73f9096db2dd4b6fc7b8b3868ac636ef2f484b96858a7a7b2f37bbfa6ece9067b45a4387f22eb993911548e303660a8d4f195a8026c7ef86323c5cc0238ce8deea9d43010119c4a89b5da0f6540ccbfd91596ee9092ba94475d688ad136249d2c1e7af5a74f2ad2b7fd306771ef91578ef4"}, {0x48, 0x107, 0x80000000, "c559f643904c9beccacacd90d8661dd94fef5b1e99bc95d3ffaa619608477c62cf9f0a0741e8486ba3e7814b98f99c353a8b51f7a5295d"}, {0x60, 0x101, 0x7ff, "e00fa1c4ce174fde19cab726245b97f23c336052be9e37696bd9a1e45912f749297603cba17dcee69b89172706057614bf9c1e61a288708a484f17e72f3841c948fac570d5006cd04a"}, {0xe0, 0x112, 0x80000001, "5a2a5e7b8fb41e57352737a8cb9271da5feb2fc25648f8d5fcc60d2aca2ccdcc8ab1dff6094e13f0bf49312e7b13b855b8051c70137ebb55fd81ed4717c83722f56bc174cd9c5c0eae374c7765c05c31e3c6ebc2e6238a7c612736d7134ef099fcb1818c070dceb28906ee092243b8f975a7b689faedffe226fa9daf4d6d37be85b4ffb262a32819b10e7cf5068359521fc059edc7e12af0716ecaa368786d9f232aa0af4bb73629b620a4d7713382a8af305bf1ee4f1732a45b87bc11935965ba225e153d6d982319"}, {0x1010, 0x0, 0x10000, "cdf7a118d3fce9a83e0597abe0452c31f9bccf874ffcd3b2afd3a51126391387997b7d1e249548e80f660bfe12fc6e9868693d5c1935bbcc65cceba079e00bc85e71437b3b9f41d5f675357bb2a03d6599d70342d9fa00f2422553c43bb3dc36130c1a517b041d6b8ba89f0a49a2c5c4a07af936fbe5945d1b1ccdc4b3ad2dd36dd83c8f5192689fa51f0c734fada36cd7abec9ecf2099a758c2ac8701ed8be2b8edb0e1bf4732085a871aa7dcbf42a9ee5887dba9b6560bae4b98f7ec9995193f7e227d3eb09f9f0fb09bcbb6baa9919011640d486a661619cd3a306bd08a9b9040a2462ba6fc1ec1639710edd17b2993b648465bc3f1f77487db60ea3d213f37652dc9b7bcd6488f4a716f5c1ecbaf299d96ab1f15e53213e1ed18f6783ec8673347207ff425301154f6436a1d9c51bb1e64c6ff34360db626b6ea18ddb394bcc4002f984c960d8a0303540c5381ef2271698da5b1a20c7673431b163cb7646c9e4d170175196195cb95dd0c8acbc4664c4ee39976c98e418c146f540978e772e6384b6df373fb551810971fdd0ba96322f693c578c9106b3790e7d33add65c31fa4c29a962ec47185907812b2cd81ec0701a0a0087961836d3f6f5fe2dcb2bd6d14ddd82aa49e227682baed585b09e7dcdb312b75fc1604d00ccdaf7ca56b78b39ce16f6fa03e2968bdd42c1c5117a39d0f54d031940540051c91859487052480b62b6c5560a044e1be9ae69e3dd3a2db8e477ac539cb4f13a3c38f1c77b8760ac7871d8edf889a8c4f8c3b2119ee131f6a70d79f99fda245d69ff39a798e400b35966b5bbcf31e4a801ba43a3bc9d22a5d23484b08e1d499c81ad93f194fe7c3893c8a8e59e0120d1f2361426eb1213b259d14d427c8353addbc162012653fe36a7378e25fd9f44d8b276cc2a1e050af42528028c0d9c741b989772aa66a1aa79d3132064dc085a1b2428811a0763dc6617dbc9b8971e9c449cb2ceee9e08e06587ca4be7404092378891225a67c2db6a30fc36c88c0baf03b35671a2cc8e1236b2cc39315a23611445b7a52e97d1764516b020917f900d6f0bec1b8ff0a04537fcf9c023aef8c5badf850c83e755dab5b5fe2c3600eebdcd9aa347bb87c51c558ccf71a65497bebdf597e38ae07cadb180ff184a5f956d4bcba5dc6bca92fb5669616d3bd5b603955c3706ec30c44895191595c52307afaaa6b59c57a732ffff314e01e94982b45082438a4ef43ed7e6fa8526fc16dc2ff26159c9f0ad6e5685ba4913a05391d2c7e47dab371cd83a3a969a7afef16ffab37a40520575ea450dfda9f16354bddcb96c5dcf91ac8db833542e3d513c434c9bdc97f40760c148bdd63f3d6fd1e3d7fa25655f7b34f2cdce9f2f36e4cb6911e92cc928a0d1962660110033768ded9ca875a1373c490ead8b630a48da480d9c6f8179658b8ac9dbc26eb0230cd897e904f02718f3aeb1106f320d71564be5dcccb0dda2d7bfbe27189348a876183856e96c6038f859f592cf68442f331691987b88ed624a426ba66bc887f92c2ce6113a9e9d7afde5f473e0a36c8abd9fe617ccadb57f873e78cfbb4bde7bafc96123895910a96991d4ebd466eda1aeae3accf099741af5d664eb4058c3731f85cf9128c6236b58d1ef64fd932442b37a77ef3cc72e15341b2d8b93a14c563a30e6080c6dcdf40ea298802742826a7f70ae4a5e56f05f648018c64c0bfd13cb625d153ed1e0beef197473a28f1381b9f32591a3bb876675df233974f62d4524741031d45ff8f346a5ec8a5b88238c3102f1f9254ff85badede378709e936f24e2a228c09812837cef572ff39e3868ba2b64dc85c7bf15b6fc8f16a8297de4c1a6ee1d556dd3281a9a9b186814ca012471b74c0a4fee1305767c3c459ba185795677a5de333e1bfa2bc8b0cd2be91978bc3a551d26aa1d7b9e3b2c70da639029a65590e751ba3956dd193e85a968147c8e873ebe3c90cc213ebe2a78a3d893f6365ce8b2987d0efb7284166c4f711dc2b4e31b5cdea29f35fbdd45ce5f006028697e1d4b63de0a460863b294b947017941d090aeb1fa259b419287c165447ba402350ecca1d14f53a367ffc0d122f92aa7825f86989bd16c4d6ffa2dfba2b3e54bc5ed861156ce735e096dd01f712c46847ec3bc14a20e6930faea88058986e0eedfbb65830f89f83b9626dcaecbf49b682f3df5588c19e43e38150622db984aae035ef1eb173a4ab9ca4db5c75052b02ab8c74a1e8673f9a0c0fb396848309f020e6fb1bb872a5c0423f7af4fe47bdd86f2d7375798b996b3f78b1f8d4ef5f200a53f45343fadbc2cbe9a6e7e5bc9ec0f832251b50491f9050431c1de51de3cb4d5609b2e75892626c18d82bcc31bba87dec871affac7516728efeee4489d3ab8c62da9fa4990753a6fcde92ae9bdf01e714acaf0d35548ced82efe7324e6dada7569e9cf6b63b7603d76febf06f319eecf259840bcd725b88ea8589454427eea38bb25aa03e4b35ba26d9d524e563e5d3af2b4b4369ae990d9ad1f2c65bb5d3c9c7b317a08b0a101c1123d0a6009079f293e0265e2741a00f1e232c9b29756f88d6e1fd6177b3368a1daa429a4858b604fa71a89419d097de33f43e31c84d6d06c8d273311dd29d63b2c835cf47943810b33afba0735084f8ca49632bf096e7fafb36f49eb0598fde3fb2957f6092156dd2b070449f69a3b4366c3dc532d60ca1cd88024ed1f3c842d7c469bef765ff3f0efb089317b0f9253071924424c72223dbd0bafbbf4e32a17e61bd80db159651de3445407c52eb066d0a85ccb036455bf68ac853a3a3261fd5dd86697a175521923967a8b8c92659aa62ad7430d2966c781be155fb859a9ceeaf7c9a216f761f59589c83949e0909170cc9db276bfbc7a865682be8c935d536e56563ddf0d2dcd4b3d3baf9402439982878176140b4c9df5dfe3b536177200c2c355b2dd4ee9580406abb783b89352dfd646ed89d1415dd5c87157c4eb12dbb34ec50f631945a41891d9318b0e14c0c3220ce3e558134c60b6bf33ff60ae66594352375a719dbd951bfb63df43c102fa2e04e030b724b5df061e3e94a05489093e243f1358299156f716a8e6cffd7f66e49ecc7e885e63b29b47a39d7f2399f256fda01fc375097504a46942a8eaa537736acdffb1fea4532783f1c3e1ed4ac54f0426a712e788012da117333f3693cf3c2a44c4565ab2a4520c03b1b353e31d62ede2fd84f83f3921b8dca11f7299bddf4066dcdfcd9f9f8fc358be74505e8aaba64ba28530f7358739d8074b6b7c51e17b4d08b97297b70a989f57043fba88418e748ff2da6236369ccadaee962a595717a831c787947dbe0a907adf6b00f032149d1be71c340289ff1c3165c4bffaefa4706cafa5c0d592aa99e28ccf370dcd9205fb7481415ec6a9335e0062809922f5f99e42fefbcd7b33669737f5aba723d28a7b90f6dbd06857bb48028383dcec4aa905e3b4b6c89a08f3c2ccfb2a02b3d908000f8382036c927cbbdcfbd8203505f70e9f632878ceffba02409cd5de8f6973ff569f29ab57717a8bff35440ea1a22187712fb018260ac043b76cb2ea6b1b90a4c8473a733d83770354066b0c31b53a652fc2a53ae8ddadcfcb2768b585ed01b041edb0d3e39788876eeb30f6d766b9b00834a9a3bac1640a6948c944c8791cb25ac2a62e21962521cc9ed5d56f848b9df6ca6c204b96451484bd812222f93eafa3cd1d1e45e744710b60ebcd8de49b5cd861929a95488baf9eb92316411d837d9a6ce0fe01424e9c261651be8f43a61138127721327bdf5ad0112543fee5d338779b02f27922b72f3a9ad581fe016c6bccfecca441b01c965ade46d291ebbdc25b87dd58a1db93f1e79dbe4c1fa7ce60234be448c2a091ed5a43551b826c50689c5d08447422cefdd3439703d37f9a2b141c7e3fc996062ae0883e7222d0b579b10286b72ecef1804136c39779378a18f32bf9c5bad120f636ee08c1f9d1c4fdda3937b9df422056aa706edc1053dcc3bee630d867e55b7a64a9a08ffb0e1dcc978035c744d1f4a3410d17f57f0d4d730d1d76f83a3547d885bfbc48c35282109636038dd9283754972e7b606289d60e7d335cace1ae95c8c169eb8773d997109ddfa719c46d4fc71b1b0b14918e164cf02223fb8690a942dbe0ae934cf3d3a8ebaa48bdbe0d56cdf0fa7a8c6ba7179ab01c18b10d09ad869a3b8b07969b2d5377f10156935df1725b1ac9267712485d781c5d7ff34bbe10c12e9b8bee15a342f1749abae1f5fe925fdadc78117c0aa367881a7377eaca06e37efabad66deb3b11ffece68774de08ae74551accdbe6a93e67db20c01291be8b6b398770813799ac853f6668378cfdf20f0e3dc7f0d0646102a206b9894460e3805eee3584433352e8919849e2615aafb8b852222c859eec57986bd21515ac0ff3e773110fb205ba4780a48ba1389beee0bbedfdfdb7a1e34b60ec6b86f8028bffd3f14d644a17fc2e1740447a25f4a40260c2fe2d899f55377361eb2877b91fe45fc38dae40610f96405581bbc265e1b1c60e27d891ca6347ca9453f311db8b722c9d759a56cb67dd2a6ea8418ab8f7860918fc21e7f5b50a9b969f2f0d903b8e211a340a9fd2ca690a6eb231e7d43712dd1acf9436eb657895dd26b140cea3852edb5df4b4724e6a8a93a63f19f491b900e8bc32c9a839ee943ea6a41b28e6f546f7067a9e32210bb07cfc5414795c49a7493f3ee16ad580cdf206fa24d731472a80aa28696cb169572629788717b48a84325ddfaf674fd1185b2e400d51d2ee2adb22e7963691731ec73ac39566d2c39b50aaab28a521b41d4b85aca76f79e7a2b5cfc2fb91db2b05403e9bdda282facbf4552a2808fe3cf68f25aff49aae44825bc11bea211f9afec833dfdbc8b637e9ced0db214d7e868e7a8ac98448259dfa8950a9f9280076d5a3cc8b57a8f9f6e28f274ba8c3feb48a1c0d3e0a5c12e30d7ce2834285c55c246003eef628ab36a2b2a85a478004ee54910f5b84b3b4e5b62a0e933d1285be2643da7d8f41c91e018a72759f749e572b87ad53b5a4202cc09773e98631a93b45379c98267633a01bce195ec8164e8e7ba3b8ba74d597e7d5956ed281d2df603bbff7f59c74b21dbf3c0ca4dbc0f4dbeccf00e38f7a96bf355a90491ac1573cb7afcffc48bbc637f8f7b71980c4ae7c93ded9cc8220c21c5b0bd1e234c53a511a7583129a996e88257aa6a0275c948d21bed9830cc122e1d90188985d8ae19fc5407196faa45356a6a47856aad688a7f6d0dd597bdbcc9daafade82d0db950f2b0a2bb3656328e18bf887185bdc636153412ac49de3a8dde83ff3615394f21604ce863332ae5e73b60b9a7c2297cd48be1f887b98060d0b0a2060e8cb47164533d64cc1c166657af3ddf2906da06a50427a46fc590ab3e5bb7724d930f751c8c5c3d9280cbd3a2935bcc96bef3b4c44c1d456aa38520464ca5fc8a931927f48ed3de5908ebbf874f2952995bde74b753d627148b44ff9d0e91d30c1271a3b8f6f92fe1ae8213397a7f19d59f154bfeb7b5e43eb253fa11d3f0f62554bb1d05ee99032fe35de6a79658a4ac35d0a55f853117fa7f9dbd08908cfa3101cd8c5eba35b3760aab14bb71436e137ffad6bf9eaf3807ee8dd828e31c99c1e9d3c49976f219462b05eaf57fe55960738029fa24ab0a6c322df5adb975bbb82aa36f778b191dcf86720de64c23d5a2b6a51c1e8953a7e8acde0f2d0df8717849d3222cc00f1ef54444e3de6c"}], 0x1460}, 0x84000) [ 2036.927857][T22319] RSP: 002b:00007f074b93fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2036.936390][T22319] RAX: ffffffffffffffda RBX: 00007f074b9406d4 RCX: 000000000045c849 [ 2036.944404][T22319] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2036.952484][T22319] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2036.960535][T22319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2036.968511][T22319] R13: 0000000000000d12 R14: 00000000004cb1d9 R15: 0000000000000005 [ 2037.037442][T22339] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2037.037442][T22339] i:0.mC0w[:YH [ 2037.037442][T22339] #<^):4<] [ 2037.115191][T22342] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2037.115191][T22342] i:0.mC0w[:YH [ 2037.115191][T22342] #<^):4<] [ 2037.140402][T22339] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2037.140402][T22339] LLnCq2] [ 2037.157797][T22342] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2037.157797][T22342] LLnCq2] [ 2037.178422][T22339] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2037.198285][T22342] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2037.215043][T22339] Error parsing options; rc = [-22] [ 2037.220968][T22342] Error parsing options; rc = [-22] 04:33:13 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="00f0ff7f1400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:13 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:33:14 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='\x00', &(0x7f0000000000)='debugfs\x00', 0x280000, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:33:14 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000000f00192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:21 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:21 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001200192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:21 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x5c1241, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) r4 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x18) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r6) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000140)={0x1a5da77d, 0x4, 0x0, 'queue0\x00', 0xd199}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={r5, 0x5}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r7, @ANYBLOB="ff0195fd0300d20ccc030400"], &(0x7f0000000100)=0xe) 04:33:21 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000040)='iso9660\x00', 0x8, &(0x7f0000000200)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc7\x93\xab\xf1X\xb7^\x8e1\xce3\xbb\x8e\xd7d\x8e4\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2\xaf\xa5=\x04}\xad\xc6&:\b\x00\x00\x00\x15\xc9\x16w\x05d\xdf\xbd.\xf4\xecB\x92y\xb2M\x9c\x98\xa1*we\xad[zd\xbe\x19s\x90m\x16\x92\xf2\x13y\x98U~\xdb%\xb2^\xa2\x99\xcd\xe4\xb6\xb3\x00\r\xbe\x8e\x1a\x86\xdd\xc6\xdc\xb4\x90\x8a\x00\x00\x1fSC-\x89\x05\x89\xb7\xce<\x83\xbd\xf7\xa8\x12\xed:7#\xe2\x0e\x9df\x83Bg(\xf5[\n\xa6\xafdI\x1e)5c4\tE+;\xee\xd5X\x02\xd4\x15\xb5-\xfd\xe9-x\x85\xb6Ut\xf7\xbbI\xa2j\xe4\xac\v\x9c\xe9Y\xc8\x1a\x1a`r)>\x7f\xbf\x00C\x8f\xb4\xe61\x97)\x03L;xw\xe3r\xae\x03O7\x0f') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000130000042dbd7000ffdbdf25250907404e224e20946900000400000001010000060000003700000017f2ffff0400000001040000", @ANYRES32=0x0, @ANYBLOB="1c00000008000000030000000100000068000100b3af4dd71b4708001ab1e2be6bd537080342320155253e42bc81e19f7b583b3f384c05aab0a2de504deb9aeb65e0a12c3179be003bae17da45c1242d99dabb439b65c611468e9da844ec71515530f217a6fde2daa7f3ed5ca1897b6f18fa1d595a15fe2f"], 0xb4}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000000)={0x8, 0x8000}) 04:33:21 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f00000000c0)={0x3, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x4, 0x610401) mmap$usbfs(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1010, r4, 0xfffffffffffffffb) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r0}) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r6) ioctl$USBDEVFS_FREE_STREAMS(r6, 0x8008551d, &(0x7f0000000180)={0xa62b, 0x15, [{0xf, 0x1}, {0x2}, {0x2, 0x1}, {0xa}, {0xd}, {0x8}, {0x2, 0x1}, {0x8}, {0xc}, {0xe, 0x1}, {0x8}, {0x3}, {0xa}, {0xb, 0x1}, {0x8}, {0xb, 0x1}, {0xb}, {0x1, 0x1}, {0x5}, {0x7, 0x1}, {0x5}]}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000080)={r5}) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:21 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x10011000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:33:21 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:21 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0xffffffffffffffff) [ 2045.255702][T22390] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2045.255702][T22390] i:0.mC0w[:YH [ 2045.255702][T22390] #<^):4<] [ 2045.317538][T22390] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2045.317538][T22390] LLnCq2] [ 2045.345756][T22390] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:33:21 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001300192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:22 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r3, 0x80184153, &(0x7f0000001480)={0x0, &(0x7f0000001340)=[&(0x7f0000000000)="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", &(0x7f0000001000)='~', &(0x7f0000001040)="1e86173135e5a06d322dc430c86b82f785172935f5f6fe8df2abd1576210593b3c246a71ea0258baadefab87f2acfa0d47bd07a87197f2e6b414ef4a1ba1fa2ee46d6abe9384a506bd0785fbcd5169a41cdaa0", &(0x7f00000010c0)="8c8aabec0b5a270f23ea8f3116855cc104e89fa6b082cc1d42e80ae35b019e2e7b60d755ec39251da5ddc5c4a2669855e4f0ee74ea7f17fd072964f6fbac0f38a5919a8badc858995282a602a3024f906e89ca74f60fafdc44968d92c6e1d7be57a2df5a21c2978cf515f36525e4c9288c342c922741b523308c9149b56ac59538ef2595b2f69833af13a7ce9ee9491cadb50822391e59e9ea977f2766855a9e21c79a8a91c878de220d28dcf182b9d8c32d48894f263b2355552182e6d10d85a651cd8cae7ed77c651197ec4eb845506c9e68006a3032ac85a7159003ce987d0dc4749cb4711e9a85a77f1d487527cac45a50", &(0x7f00000011c0)="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", &(0x7f00000012c0)="5db5ae822b658ad11d5be48ab87fa203270f2c60a7af221e51653a966468955e405bd3706272370abca5b6969b8348c86cf651ab801178deef3c45b98cbc4c636ed24296f3f5786ccab5e226e2e47f3f35ad46bd61d5c15ee3157a78c7cfedc69377a7374323cb379bdb7ebfe566b4c22bc1e761e5318f1faff5d28ef338", &(0x7f00000013c0)="a9a53d1a1a208fafa5b281733963cf36ae9297192c71c0b1e518a0ec4ffbe5c25c8fbb3b318dc03ddc4e887e138464ddd93b445031b54fd75bd03f2ca860c466cc11437fa2b4ea23aff6f9505aeb8fba3328d16e1c3ebcf164967677beb0b952631e252ebea9bf42e4fdab849123af9c356d9bdef4583d01994b92ec0831f10d27ea021112cdc2"]}) [ 2045.382242][T22390] Error parsing options; rc = [-22] [ 2045.395796][T22400] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2045.395796][T22400] i:0.mC0w[:YH [ 2045.395796][T22400] #<^):4<] 04:33:22 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="0f0000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2045.470985][T22400] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2045.470985][T22400] LLnCq2] [ 2045.497359][T22400] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2045.573147][T22400] Error parsing options; rc = [-22] 04:33:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:28 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:28 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580200001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:28 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x8000, 0x3) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x80002, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @output={0x1000, 0x1, {0x0, 0x4}, 0x6, 0x7ff}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) fsetxattr(r1, &(0x7f0000000080)=@known='user.syz\x00', &(0x7f0000000200)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2', 0x8a, 0x0) 04:33:28 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x50) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:28 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="480000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:28 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$9p_virtio(&(0x7f0000000200)='syz\x00', &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='9p\x00', 0x24000, &(0x7f00000000c0)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x4}}, {@cache_none='cache=none'}], [{@uid_lt={'uid<', r4}}]}}) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r6 = dup2(0xffffffffffffffff, r5) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x9, 0x8, 0x0, 0x6}]}) fsconfig$FSCONFIG_SET_FD(r6, 0x5, &(0x7f0000000140)='bdeveth0\x00', 0x0, r7) 04:33:28 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580300001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:28 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)=""/67) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) connect$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @host}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:28 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x204000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000200)) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:33:28 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580400001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:28 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="c00000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2051.988210][T22450] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2051.988210][T22450] i:0.mC0w[:YH [ 2051.988210][T22450] #<^):4<] [ 2052.031894][T22450] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2052.031894][T22450] LLnCq2] [ 2052.086839][T22450] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2052.135079][T22450] Error parsing options; rc = [-22] 04:33:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000000)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:36 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="c00e00001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:36 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580500001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:36 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clock_getres(0x4, &(0x7f0000000200)) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000000200), 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB='discard,statfs_percent=0x0000000000000007,rgrplvb,fowner<', @ANYRESDEC=r1, @ANYBLOB="2d10"]) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:33:36 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000f0000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x1a, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=""/94, 0x5e, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)=""/133, 0x85, r2}}, 0x10) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000001000/0x4000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000000000)="c7e2ebaa1fed60238e53f8803c64d9e3a1", 0x11, r1}, 0x68) 04:33:36 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="e03f03001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:36 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580600001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:36 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f00000000c0)="402deaa672c29d61561bbef8d2a2b73a7b4a03cd524e0f0837bda7160f61ec63c9245e2102fed93a7dd75f2589185b0a6f19fa8cddf5a5640f98aaf4041351983bea791ba8e424df7a5c50a47466f31fd6b34878a67d55df7f3a480861478ad6428fa862fd8a03", 0x67) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r5) accept4$netrom(r5, &(0x7f0000000000)={{0x3, @rose}, [@rose, @bcast, @netrom, @bcast, @default, @rose, @netrom, @bcast]}, &(0x7f0000000080)=0x48, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:37 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000040)={{0x2, 0x0, @reserved="c76add56cb490a202d72bbeef16abdcc1986f00fc2f6b5e056e92111711ed625"}}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000080)={0x3, @default, r3}) 04:33:37 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$key(0xf, 0x3, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000080)={0x0, 0x1, 0x5, 0x41}, 0x10) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) chdir(&(0x7f0000000040)='./bus\x00') bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) pwritev(r4, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:37 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580300201400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2060.556853][T22502] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2060.556853][T22502] i:0.mC0w[:YH [ 2060.556853][T22502] #<^):4<] [ 2060.736921][T22502] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2060.736921][T22502] LLnCq2] [ 2060.772605][T22502] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2060.785971][T22502] Error parsing options; rc = [-22] 04:33:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:45 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580700001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x80) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) ioctl$DRM_IOCTL_MODE_SETGAMMA(0xffffffffffffffff, 0xc02064a5, &(0x7f00000002c0)={0x7, 0x9, &(0x7f0000000200)=[0x0, 0x4, 0x2, 0x4, 0x287e, 0x100, 0x8, 0x3f, 0x6], &(0x7f0000000240)=[0x2], &(0x7f0000000280)=[0x5, 0x0, 0x8, 0x40, 0x6, 0x6]}) splice(0xffffffffffffffff, &(0x7f0000000080), r3, &(0x7f0000000100), 0x20, 0x8) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:45 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="00f0ff7f1400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:45 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) syz_open_procfs(r0, 0x0) ptrace$peekuser(0x3, r0, 0x3) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') 04:33:45 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000f0000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x1a, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r4}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=""/94, 0x5e, r3}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) [ 2069.010237][T22531] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2069.010237][T22531] i:0.mC0w[:YH [ 2069.010237][T22531] #<^):4<] 04:33:45 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580800001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2069.075534][T22531] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2069.075534][T22531] LLnCq2] 04:33:45 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000000f00192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:45 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = getegid() r2 = getuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./bus\x00', 0x7fffffff, 0x6, &(0x7f00000003c0)=[{&(0x7f0000000080)="351fae3f6b0f42e11f10f398f2c3fac7bc9684b93869fed0da99bda1c82e705b516327bebed2d5b811857670ca06daf87e22106b56507d0579dd6d156ec8e29a1337b0f20dc5bf92feaf2e495ff43c29f033b89ad08bf2d76768e34c4d3f3483c8a9dbb296f62c809032572cc6ca259f17ee793e661a1eb67c40e4e566233001b2209e8fff912d46563bedd793392357affb8e58d964fac7da74c4c607465bc8d7a9995c1b83d005adfb4ee735450321aef1dd19a7ee1667a6c00a7ee067cbc2a617b0c4b61c94d97ba3", 0xca, 0x800}, {&(0x7f0000000180), 0x0, 0x7fff}, {&(0x7f00000001c0)="44d63f111bed1ce7401345f413fb73b4cf0d1e71f9a9210d99505eb7e6569914fd2a9c2635c850c2be9ed0e1ecbcac23090c107113df4ae7db2479a018d00eac1e9dba64a6600d73105c78cc6623a250c644fcca710ba64cf2f61a92632ff941e2488e3b1cecde158620241b4997da2ee7e647f9aae4f292065f12f10272432a05b2c0a3d67d4b97a1ba8318e75a9bcf6b7c18f9fbd42bf80a9ae3d1eb13a14a14f19859e24fc383b5082686bd49b271e62b9d9b585c1bf13d89c4f6e74b6dbd90de3893a319d6504b9f21e3999c76ed6842fb5de64c50", 0xd7, 0x98c5}, {&(0x7f00000002c0)="8a79342271b50e1742e3f2887aa9b3d49a8a1da74f4cff147f92a991b3079e59125b634d90e3e4273fb8a8c36ff6e988f178af0b396907a853d68c1b5eb6039330bfff4639631ee616a6d6b29feedb414aeadae5e49efcfab0d563a666c90def4ec3c66777b6f00527124d9b256009875b1ff437794965fa94a4f36a8b8521dd83e9f870ce13a977701601ec7e2820101f114b66a333b2122a867bdf59a89049b07d195823", 0xa5, 0x81}, {&(0x7f0000000380)="edff7a7d3a5b3684009f8a5eb1a5fc64fedbd7695c2392e9cbe052f45762846c51eeea177bf3ba19d3320ea0632b5e2139c9c5b0d3", 0x35, 0x5}, {&(0x7f0000002040)="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", 0x1000, 0x7}], 0x1a02211, &(0x7f0000000480)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x7fffffff}}, {@gid={'gid', 0x3d, r1}}], [{@smackfsdef={'smackfsdef', 0x3d, '\\-.]user%'}}, {@obj_user={'obj_user'}}, {@smackfsdef={'smackfsdef', 0x3d, '{md5sumselfvboxnet0'}}, {@smackfsdef={'smackfsdef', 0x3d, 'security'}}, {@smackfsdef={'smackfsdef', 0x3d, ',$-bdevuser'}}, {@fowner_lt={'fowner<', r2}}, {@smackfsroot={'smackfsroot', 0x3d, '\\'}}]}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 2069.114972][T22531] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2069.184988][T22531] Error parsing options; rc = [-22] 04:33:45 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0xaa1d, 0x2, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x1000, 0x400}, {&(0x7f0000001200)="898fdbff41db661801e729c3bd02aa319781947fd57aee07beeddbe6190171055b324f12459387a0bd783ff1212cb3c04f0444474a31fbf653a3bb7bf50b029d23a2f15dcef711e376374652fee0a69b65844b2af5b3633673c6cf9edebc7d9b7f4df25018a1f07a01635ad7d537403c7608d3f20f477edefc9e650aecb601d2bed2c086967b00be93f1d4e6697ee838aec08fc9c58fa5d0cead7a48d93bb37771e7c844c745edc8f9c4332a25bfb6cd26397b0f95349c7a18745289aaefc1b2375a17fd647b747282db01332d8bd4cbe0ae13", 0xd3, 0x3fffc000}], 0x200000, &(0x7f0000001340)={[{@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}], [{@fsmagic={'fsmagic', 0x3d, 0x8}}, {@smackfshat={'smackfshat', 0x3d, 'selinux'}}, {@smackfsdef={'smackfsdef', 0x3d, 'em0'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@obj_user={'obj_user', 0x3d, 'security'}}, {@obj_type={'obj_type', 0x3d, 'loloppp1posix_acl_accessmd5sum+'}}, {@obj_type={'obj_type', 0x3d, 'ecryptfs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r1}}, {@uid_gt={'uid>', r3}}]}) 04:33:45 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff}) close(r3) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="110000000100ffff00000300af49eba2bb5975d86241cb910fd436a8e4648b2f3030020e22907d254fd624eb010000001b5f61e8c946cb1f00000000fffffffffffffff40000", @ANYRES32=r6, @ANYBLOB], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x9c, r4, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xfff, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x2c, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x8a}, @NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x40}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x4}, @NL80211_TXQ_ATTR_AIFS={0x5}, @NL80211_TXQ_ATTR_TXOP={0x6, 0x2, 0x1}]}, @NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0xbf}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x4}}, @NL80211_ATTR_WIPHY_ANTENNA_TX={0x8, 0x69, 0x7}, @NL80211_ATTR_WIPHY_RTS_THRESHOLD={0x8}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x24, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6}, @NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x8}, @NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x731c}, @NL80211_TXQ_ATTR_QUEUE={0x5}]}]}, 0x9c}}, 0x40004) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:45 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580900001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2069.376374][T22562] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2069.376374][T22562] i:0.mC0w[:YH [ 2069.376374][T22562] #<^):4<] [ 2069.401516][T22566] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2069.401516][T22566] i:0.mC0w[:YH [ 2069.401516][T22566] #<^):4<] [ 2069.411326][T22562] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2069.411326][T22562] LLnCq2] [ 2069.423557][T22566] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2069.423557][T22566] LLnCq2] [ 2069.434747][T22562] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2069.598093][T22562] Error parsing options; rc = [-22] [ 2069.603891][T22566] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2069.617308][T22566] Error parsing options; rc = [-22] 04:33:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:52 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001200192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:52 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) timer_create(0x5, &(0x7f0000000140)={0x0, 0x29, 0x0, @thr={&(0x7f0000000000)="6cf855a5b0d15d87aded61a7c713822d9d3871c262050828a8c62b057eaf0334646df98bf691b8ade955b5e91e3b5fd8aae75f8eb673f374eaeabcf16651743b7c876576a312827e548b2fbf114cfaaaddfbebfc179f8295bfeefdfd1d561452c7a7107cc3c040dcaa43284f09e7803d8fe9ab7f195a80e4f22e1d3b8442bac2fa535aa23e1ae728cb34", &(0x7f00000000c0)="fd288cedeb7e3705492dd6b44b97a55c9725c608383f485e226c4c9ba3f98c2b667d19846c537ccb9b969c640bb05553f40c912153b94985cf7ed6343cd132d9b188997056e9eedeb37e4bd45afe8ba6f680f1f2c686fb1d26"}}, &(0x7f0000000180)=0x0) timer_getoverrun(r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="aa", 0x1}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) ioctl$KDENABIO(r0, 0x4b36) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) close(r4) 04:33:52 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580a00001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:52 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20104000}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x3fb, 0x10, 0x70bd2d, 0x25dfdbfb, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4002091}, 0x4890) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x10) getsockname$netrom(r4, &(0x7f0000000180)={{0x3, @default}, [@rose, @netrom, @remote, @bcast, @null, @null, @default, @rose]}, &(0x7f0000000200)=0x48) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000100)=0x3000) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000080)={0x0, 0x7c}) [ 2075.581968][T22587] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2075.581968][T22587] i:0.mC0w[:YH [ 2075.581968][T22587] #<^):4<] 04:33:52 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580b00001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:52 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001300192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2075.667702][T22589] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2075.667702][T22589] i:0.mC0w[:YH [ 2075.667702][T22589] #<^):4<] [ 2075.743449][T22583] cgroup: fork rejected by pids controller in /syz5 [ 2075.773306][T22587] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2075.773306][T22587] LLnCq2] [ 2075.781427][T22589] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2075.781427][T22589] LLnCq2] 04:33:52 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x104bba738d3ba540, 0x120) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) sendmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000300)=@l2tp={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)="cd0e65c52d4b082e8b1c41d37cf595f7ecc468cd265579e1f0f7d3b62342920c632e89cd0fa2c7c7eaac2f261a87368304b3cb2407ecdbb94127d00ac85ebbbb4524ad7f0240c136252dec030311a0da0015fc4ebddb2800a6a62fb0c24e52829f66340f87875b1ce97995f96e02d33c3175523f94152ede3266e59fc1c7d6f109ef9a7b19a426ba6609105c81e7de8931dec9a515d1377f3bbc8e069be30ebc88e0a2d08d7c6c82b3a7db8744e18ec08ec759d9b392203b191e96450bf5729965", 0xc1}, {&(0x7f0000000080)="bd264df417563ff0758eddc953d78dfb0f3ef038fa9db713806618b8b7a4ed60780cbe61eb391a237e96e72fbcd5bd44bdd7c5a0905d8d9ce7", 0x39}, {&(0x7f0000000500)="2e3201d5af158866f708073b573096d0b8db70323ac668848ef2c47804077c2bd6ffb63ef4061508b256c12c48d56a4ddb9bb5a3e2a376f0969ddda9ec3add20d9dcc46f70707ea270c556cb18246588aa9edca03bec18de1ed8f550cdd7fee84229df7254226c1cfec1125c69e818eb28513fe5cdf27622110fc8c68872c0e8d97466e15a5fc52e4797debd3ec112851c6c654d6402b5cd7cef7d0189fb1fdd20d0b3a28184c1ec533f1107a9bd719a0be3298c5212ff1ab241b5e2e00d969724a98d1555634622e22c43653087d71e2a007b61ab881137e85c9c90c57ed6e35bcff1142faaa04b", 0xe8}, {&(0x7f0000000600)="28be5b33ef3847699875a076cdcd21519e7aabec5cc28850b2f01dc68fc4169b237e3077facae8e2fd0865f52cad313141b574ce88fb37fa43a3e1e24c5422e91f9b58ba0a36de8fb36ac33b226030633a54d323a829a706ed8a5b1600f30a534e003b34e9db32e396b69b1e0c7c70e34713eae633", 0x75}], 0x4, &(0x7f0000000680)=[{0xe0, 0x84, 0x0, "eaadaaf705c8cd035d14d177359efcf47b1ab11f4e8794ba60cf4135e34ebff6c49ca5986dcd3618065618a1a61bf97c57a9c9ec678d2639dbfb69f280132ad61ff21d1f707eaa85689282f0d455fc3f100040f3b113ad2ee894483a23e5b34ac70d77e8222a84417888c8cc042d0679e00dc47c9506d2427841f8b81d78a40708c1247407e5672adc08a3b6110ccd17bbcfdb17f715e1232974a8a99580096b7a241b6203441159dfae5a5ba618f1cadc4bdd229f23555a0d82ec22a7d0923e225f89320a829419dde90c356a86"}], 0xe0}}, {{&(0x7f0000000780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4, 0x2, {0xa, 0x4e20, 0xb66, @local}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000800)="92eca08d669abbcc9de5aa34d68f14eccd4acbaf8b420408116bcfd0e6ee6c51991a0d557f478ab96b4e6036a72b6f6c52a49c112774d5c9e1355066b9bbff2feb29294f66d377024bf62a87005cbfb025b9728485b6d7897a1150211b70b2a0c194e1eb9b0417e060bf4412c04a5103bdc60162e4bf77a053a25433e874843846c2d96c2582ad78398d5c7bbebbdcf0d6669c248356ff6de4c828d50f94c754da3d1231476f8e66e94cc762e8f18694bd277fc1df1bd0d380a3dff1a5cc24a7868de1f13e8e2bd8576f6811d6a0371a7f7f2153dd8764e04fbc92a8da89f6d655596ed9", 0xe4}, {&(0x7f0000000900)="f2711c6f0807050bd789e2de13828c4629fd61a44684c3a0d931a1a4836d0ceb2adcf074d8d9d9965bac60831933dd56a85b651c9814bad56658d957a5ecb66b43c62815ee8b1e809f", 0x49}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f0000000180)="29d2ae59e7dc3dda556bd30e9b1b8169cee134538b1c111f2755", 0x1a}, {&(0x7f0000000380)="4aea15b2c329876e280adc875e2349066e3dc3eb7afa79ccd5386b2834b85d1e08fde740b7c7f1bb", 0x28}, {&(0x7f0000000980)="4998e6f50259e60a4cd7cf9f66958d4c60abb1eb9add23d32dc9d5f49f382b1dfc06eaf5157fa1d3760cff67cc4f28fc10a4f915fbe8312b90339b8d0be0e220832f531996c9b01707e368e08c971e283662d8bb2f5aabc8486a9be0c59ef68dd2454d5b1f8b511ea7", 0x69}, {&(0x7f0000000a00)="e85eef41c812174fbf7a0a1e7561c689be0fe9a60812bf6a489ea742fe5757db0b13a4ae79f859bad3727dcc310213ac6260087fd6235bfbe3f50c58f5e8fbc9af542466f62da434f5b14af5b3e86db36e71579f2de4b66545150caaa99818802a0f6b24184c6b53e76326fd1ee950901798eb0015cdd8c3ddfa1e506c2ef75fd6438f82cd9f1a7f676f3f183e961e376d", 0x91}, {&(0x7f0000000ac0)="0c2ed428ff8566f90d25294dcaf37357e04323b467d6c94d1a4c9d737f28d7fc4f96d07828005f5c8e677906de0189169cb394f51b3140c8c5e65765d1440574948a0a828e5a9730ef443ac62f0568c4cae9e559ac13d2f9857a86a57c3a1c23f20c5030dbc57c55fc43197c5310863c4b625422e43ba6b97d44056a1eaa64ac69f6e345330fac34a4bd45962bb1f3d995719542b80c79a54175037185e4e0ca98e58aaa23e12254f27cb6359a514278ba4a5a978bb5ff1da49495cd29c9676b9d6181fb", 0xc4}, {&(0x7f0000000bc0)="05618f7d5f69b3011dc86cccdc9dca08cfe3106fe1efbc1336c33badf7c661ee758e5c29f9c58131d79b40ed5fc2377a52dda99368e8913ec10c789e43af20cb3928dd85e640ac1dcb8fd560569f8ca08fcbbb7e102908cec8c2b452bfcfe93f972e4e9f28909148ff51d09ef8c31316121fb8efe82fe8de1075bffc9a6359f52c43c05f233b09b02da94ce7288b8c42d7e8b735f532b26eb25cb0dee8b3931d1ed15419ed3b09867dcfa3f7ea0dfe98aa1ed137b8b47e2e8343365769a1860f1dc67cabd1ba46a77450630cde2e643b3c68404a50770d", 0xd7}], 0x9, &(0x7f0000000d80)=[{0x20, 0x112, 0x401, "a30c172c71a0ba05ce"}, {0x28, 0x29, 0x5, "bd07a67a22dcd4a71d98267d2c190a2f7db5b140"}, {0x68, 0x112, 0x5, "5a0a2f87d6157b440d07263bec7bf5946b8c2e1cf5816a442e1f78a1088c5ace0008fbf73bd055cf90703ad97343bd0cf834eeb1ac93f4f9167f229591f357974c4ab0463aa56bac374927e43ca920942de615"}, {0xf0, 0x104, 0x6, "b6c07b925dcc29947bf2e26382411617c52bbe6babb08f3f6409a37133c362f7cdaf78cebd5b7e75e6aef1854ffd110500e8a5094ff5806546be7ce1376b6ec799161206d6139f1c20eb6d5a271298d715ba3d95cb36d72b729be14fd4031de27c15c0bb3cff5be69a39c5952b81a2077a56dfd19c61ee42383fde63a9fb0e4fd2ca25c7fe237ca17c7f8123a6aed70ab08c5bcc2a7711298ab5c99652eb2203442891c5732661fbe4502244880aacbf44ed622cef7cc5ca8f21f5e94e7c29ac715fd55e0372b9c718638c98219b2ed7a2de9c46ba53558ec78654ec3405cf"}, {0xb8, 0x10e, 0x4, "59b514b67d23d870747b1a5a97c62c6633cbf021c226ce9c106c74baaa78a438f2522d9eb98956b36d35402bd47fff576a8078244ed2ee84d5dd9a114849377acc445e92bbd415734f81500b7c222f08b76ecc04483f342ffd140f860a96572a5e1257a7b197e033018079df018006fe994e0b8a33728fcb910e929563411d86c6ee6588e68471267b9d7de3b697392cc4912e4d3fd6f6cc5cfd34fd14fc8adc50a396a21b67ae"}, {0x10, 0x118}, {0x70, 0xff, 0x7, "cf97f4be8bcf0616d7334029498c5facc955fd3652c0da34d808f1d6f9457672f8d3b9b5156bed8b741373cce70df756aff8aaac32bdb104c2f9cfb1a45bfc0acd2b4dd3b51654f54c47b023c23c1967a028dc634e0164e59c8d929f"}, {0xe8, 0x88, 0x7, "c0fa0d17449012ca30e415c237d27238fb4e25da8ade2543dd6f1a9e183c0c509f6e29d0e2c6e89b55002fa23ca1cfc617f4a4cd6040c2ab99a935482542c4359d83fb0c82622a165b958e65c157d3bcbcdf813b2d8ac29783c18ff7c7acc56a44fe9ac9987b333dc5d1f48c31f19654834ae3fecd3362abcb9b8fe8b680df361487afb2859472ad9468a2c5ad129de227b735be3b531cd53e3ddb4efc4bfcc58615e78d4216ad6099ea7ab1130a7e460c0571bdcd7aefdeb8e04ed0d05316245c3b231b4030b55cef718047a683dbdc6a"}, {0x40, 0x1, 0x0, "baa93607ffe72816ec83847a3aade72cd07076647b8a7b57472c014606c524145f6ccac57af0e0aa661db49507cc"}, {0xc8, 0x114, 0x8, "d42fa71dabeccc12ed65156eb9f24ea3b3a110331278e23fc13b246083e635ded6833b92e813649f249de3fa84dbcd71c8a5d0b53dc6f440fb758c768f25bf4621da1e72968a1540070af94926ea5a980a92e0f8f7d7af960ff71e1745e2684d6db81d5111d7d61a3dc4acbedbb21505b8144182e4fcd717b117bf374e0318cfeee6b59287bd1a72381dd870af3ace68cd9f6f549c4f1e3f5c55fbe44ad01048591d0ea8bbf22e4ebbcf9ad06cab94ecf52ef3"}], 0x4c8}}, {{&(0x7f0000001280)=@caif=@util={0x25, "fd18a753a97af9110d8db290ec867dd2"}, 0x80, &(0x7f0000002540)=[{&(0x7f0000001300)="2c6fc40a0a7a4e2a8dbf78d9", 0xc}, {&(0x7f0000001340)}, {&(0x7f00000023c0)="b7954961977c7e208efb466a9161ae9771758da5b38f7a1196bf8a9fafc8e89b3d16fa0b79c4cc85b8cdde7eaa484627a117b415019bc4bc9998d220beb4477265456b2f1c450e8d94f13bb579327d8ffa4578ac4fb38c7b88ebe45f6a775b0467c34e30e01c3b54b6365d368933d68bb2ede9a37ba0d878d97d3144740f3423e8b823d667f24eae4b036fb6b40c393034", 0x91}, {&(0x7f0000002480)="11077956de9372d5cf57e366f9d6ed1c8d311f3df3dcf4d5d2ff24525011cbed1c4c803490f1942c8ebb0a96586106d85edf1506091a6529496bdae0d5504b6d8ce7ba7fad66ef53b68f93b928919fc129eb834d67e8342c2f025c008e83bb211a32b2348f7065fb36a8cb68c3e0e048b72978890a759f77fbf7d639a864f5e24b112e922a0d415270021f7b1161534585025f4a65ace3e6dad2e329cbf272e97dfa0c720994", 0xa6}], 0x4}}, {{&(0x7f0000002580)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000002940)=[{&(0x7f0000002600)="30556ef3a198ba48d4a0cbf7e07f181649157e03f96cc631d07aa990404c3ed06313f9464d66d53f14de78b9fcca1a29ac1ff4c6475532693d080632cf98d56f8d8d3e8d4836249318c3d6331bca9bb9a6b389d3ac8655ec93e3bd6bc788cb0ab12c163ad9184ea341208937ae13b310ce2d94c9696c1a951820ff71c3a856035c538a2ed9187f8727c69d765059de87f4ee0c252060489297d893fd27622343a7257f2c6b41a269bc47a7fbab759c98409c9b0d9f363845fff143b6", 0xbc}, {&(0x7f00000026c0)="3c8d6bcf0c001f9fca9e756ad7177d2f67f785ce84eec070884451f3475120e8119acdfd2cfb7aede75cf84e6f07eeafe11ce969487d54369055ccf53758a402d60477def5de121c56ba2222e12469709149efce48e587a80340665860404117959469a4794964fd27df68eb1e1ee6ffcd4a74a9b9d0ed159d", 0x79}, {&(0x7f0000002740)="8eb30843dff532d7c1a5c5ff7aaf64a91de6e59a71344a27d66068", 0x1b}, {&(0x7f0000002780)="8a281b9f4be6e0c734487a0f6100886922dd02e373d87f972db4021e3882c6fe45884c86dff4d04c22e3cb27a0f64d6ba3d3ec5a6723f6dcd42d07601e8d8ebc4aaf559927c1d0d6a3390f94d71554ccc70c33b6cd732abcfd04129e4010f94c23407de8c802ceb87e9078017408376a514154810e27c5bcc2fbc1a12dae5bd535cdccddf0db0e7cfd8ee8ea1709db6325274493beadd0cc197b631b4f307c7a1621df0fc9179b656a50527caa8338ec565a79f27abf358838074f5ad948c42122e503c16d219a0ad3f944e75c829fda7a0fbc56238d28c32794", 0xda}, {&(0x7f0000002880)="d400475b7a4c71646b022c95da559cb7c8e881517b0d019d863deb673c6b6bee54b2d9867e993f4ea1cac7a23dc86e1bb1c979a582089bb7612ff6463741e6d592d00212b21d4f21433b9291730169f37897a477ff8416a008a0ef40e82b205909335672d6a38430d6b1841a62753e84b1a552927eca1f34e068835f76e696eac3a8378932d3bc81d82457d337de2bede3521ad65bef919cd9d1fb4d", 0x9c}], 0x5, &(0x7f00000029c0)=[{0x28, 0x103, 0x2, "841947f0d5d920b4d52272ab1e26bc78d0fd"}, {0x38, 0x118, 0x2, "4ea6b60254f64b45e6a4beb9edc42211cd55ab6258370077ef89b4f083292f0d7b846b"}, {0xf8, 0x10d, 0x4, "3a8cfafd81f1d4181fd857e80458e5c7f1cdc260dd3f3527f6c053902ba98330f895cb823b214588eb96dd57a9d3471eb47789d4b104738ab5ca5d1a7e88440fd5fb68a303b0e0eaba95eb224f161ff12fd106c24ab24df6999ac081a6e4fd7238ee30d1034eef8eb03b4a43ef7e91a047bf05b28d5a7ffed3c7028ef020d4b998ff8fbd881ea10afbabf1c3dd335c8c307bad1d160515a89ccbda864896732dca148b1646940070510bd65616aeb3e297a222e1ce856d25f3de186e99da6a75c52b551d6d21ceee58464f50f466af7020d1c74445e78c4e733699b7865f877667c02ad91c19e1"}], 0x158}}, {{&(0x7f0000002b40)=@nl=@kern={0x10, 0x0, 0x0, 0x40000}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002bc0)="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", 0xfa}, {&(0x7f0000002cc0)="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", 0xff}, {&(0x7f0000002dc0)="b2ec8fceecdc877064c71478d2d38bb0db7b5b65904468dfef3886ec9f74fe4dc3b804941c547f8d5b3700e4796e19b4dea4358a88910a50665ab55a1349b20d6c6721b3a13373f0e56afb2116a869e884d2eee03000ab6b7f7ee59e5befc1527b2300c882bc23e48f04fa4c85a1e81113201878cc776eedf8a50911cc904b04a6dd1b35541985579deb5fad86c1d984bef5ad1d4043f5e19dd44aa0f2f64e7380c88025ea789a5ae368c6754a2a7bf7e5f044bf610a4f7b1d794426", 0xbc}, {&(0x7f0000002e80)="d1cac1cbd6d357d86cdb972ef7ec6b35955ba6d6328bfcf32a742f8a9d1b529f1384a67b433b0a5f3202b425ef224fe56699c82c6c3c0857d7e6402c499cbd59476581e258fb08735a5e27bd0764ee01f99229219bbcc0ea48cc3f2e8ab84f0666e9664bee665551a82a7e7ede45369b37cf9adf61fbf85eb855fe44c0cc163df40222778994444c98250c66b75eb2e5998692b632618c50a3922f71ba20b13d504379112672b9d9", 0xa8}], 0x4, &(0x7f0000003080)=[{0x1010, 0x10d, 0x1, "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"}], 0x1010}}], 0x5, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) write$ppp(r4, &(0x7f0000000200)="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", 0xfb) [ 2075.827843][T22587] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:33:52 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580c00001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2075.884349][T22587] Error parsing options; rc = [-22] [ 2075.895905][T22589] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:33:52 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580200001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="4800000010000507000000000000001200000000", @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="2967138b9678c0247dfef930a34eccbb17b55a0bda82294982a16bb414427c01ecd35428550000000000000005a95b9dc1ed3c1cf579fa9d01000004a04442df99f0a7e8b2623506a8c8251a69158200000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r6) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8, 0x10}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000400)=@deltfilter={0x24, 0x2d, 0x5, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}, {}, {0x0, 0x10}}}, 0x24}}, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 2076.008756][T22589] Error parsing options; rc = [-22] [ 2076.126238][T22631] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2076.126238][T22631] i:0.mC0w[:YH [ 2076.126238][T22631] #<^):4<] [ 2076.175292][T22635] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2076.175292][T22635] i:0.mC0w[:YH [ 2076.175292][T22635] #<^):4<] [ 2076.199912][T22631] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2076.199912][T22631] LLnCq2] [ 2076.213499][T22635] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2076.213499][T22635] LLnCq2] [ 2076.226072][T22631] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2076.231923][T22635] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2076.242225][T22631] Error parsing options; rc = [-22] [ 2076.257872][T22635] Error parsing options; rc = [-22] 04:33:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3}}, 0x18) 04:33:58 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e1d, @empty}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendfile(r0, r2, &(0x7f0000000000), 0x9) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:58 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580300001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:58 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580e00001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000140)) r3 = dup(r1) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) r5 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) syz_open_procfs(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x9}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000000c0)={r6, 0xc0, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in6={0xa, 0x4e23, 0x401, @rand_addr="0c25431cb4e83028d5536b882acf1fe3", 0x2}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e23, 0xffff, @mcast2, 0x8}, @in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x30}, 0x1}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000100)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:58 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = socket$inet(0x2, 0x6, 0x1) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x1000, 0x4) [ 2082.214603][T22644] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2082.214603][T22644] i:0.mC0w[:YH [ 2082.214603][T22644] #<^):4<] [ 2082.271743][T22644] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2082.271743][T22644] LLnCq2] [ 2082.291241][T22644] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:33:58 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580400001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2082.325599][T22655] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2082.325599][T22655] i:0.mC0w[:YH [ 2082.325599][T22655] #<^):4<] 04:33:58 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="586000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2082.368197][T22655] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2082.368197][T22655] LLnCq2] [ 2082.381857][T22655] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2082.396475][T22655] Error parsing options; rc = [-22] [ 2082.404112][T22644] Error parsing options; rc = [-22] 04:33:59 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20201, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r1) move_mount(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x3) 04:33:59 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580500001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:33:59 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r3) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x5) close(r2) write$P9_RCREATE(r2, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x2, 0x1, 0x3}, 0xa9}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x20000, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x60a) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:33:59 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="584001001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2082.641284][T22677] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2082.641284][T22677] i:0.mC0w[:YH [ 2082.641284][T22677] #<^):4<] [ 2082.691296][T22677] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2082.691296][T22677] LLnCq2] [ 2082.759978][T22677] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2082.763004][T22693] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2082.763004][T22693] i:0.mC0w[:YH [ 2082.763004][T22693] #<^):4<] [ 2082.854954][T22693] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2082.854954][T22693] LLnCq2] [ 2082.865778][T22677] Error parsing options; rc = [-22] [ 2082.881154][T22693] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2082.897464][T22693] Error parsing options; rc = [-22] 04:34:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r2}}, 0x18) 04:34:05 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580600001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:34:05 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @ipx={0x4, 0x8fa6, 0x80000000, "ea8a9167ddfe", 0x8}, @nfc={0x27, 0x1, 0x1, 0x7}, @phonet={0x23, 0x8, 0x2, 0x4}, 0x4, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000000)='lo\x00', 0x5, 0x7, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000003040)="ef", 0x1}, {&(0x7f0000000280)="a70513c0f1b9511b531bf01bdccb5ca1c8c2123ee2b3917672851174e4fc8878661675fcc31845db7680da5ebe28a2f845139d5fe735e0531d5b18e2996d5f148c1b83947d9acedb50756b51a380873ddd4ebab3455c1164e885cedaeb9545a1d62e227615d1adbdd176f6ad69d626b5abc7e664d4f8d699eda905f9856566b258b48ac7587e21d4175d6a16aa46240fdd55e5495164f9948eedf78a51a2edd785c9305ab939410c11dffdb7ac16280b30aeb327ad414cf7e9b885c014592d3985eb4296ba6b9edd315c4823e590ba883c76de6a99c98739bba16eadc8c22c1763af93a9810949fb09c4345920cc852fbeb2c0cdacdad3870f4bd95a00096856b0893b1c8a086bea6584c733e59fda7531afae9b622cc6252d4ebd1705486c39c9a0490ef0f760b51054fe11676918768685ce8c987a18c4384ecd2a4d946cb6a2073a4cea30a281c4d263ce4cc30b250173965a286c3ed241832087916874acbeb39aa3a6c9abdead71989878ee28625ef351b1b95f0009b9d3181cd79881e33cc97267df7fe8d5a600fa843877ae4b0360c2985c20e79fb55794a6c381ea2d0a45675ff55fcc", 0x1a7}], 0x2, 0x0) read(r2, &(0x7f00000000c0)=""/72, 0x48) 04:34:05 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="584b01001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:34:05 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x8, 0x4) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x156487df, 0x5, &(0x7f0000000400)=[{&(0x7f0000000080)="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", 0xfb, 0x2}, {&(0x7f0000000180)="25630b3bbcf7a3be9becbee4c4120003cc9cd8fd58cffdef3a880a655d0ba50a129ed95964c23dcef6ca7e23cb37dc4008aa7e98b2cee876be9684897407f210bb47d84d7108a0", 0x47, 0x6}, {&(0x7f0000000200)="6787247bcde3ec3e011a0cd6501d096d8ce26331f6e3de9cb8bd7db89d9564af474bd4204415975699c8d2f9b7d00e95636c5fe507e1b68412465ea6bba529", 0x3f, 0x5}, {&(0x7f0000000240)="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", 0xfc, 0xffffffffffff0000}, {&(0x7f0000000340)="f88269d471984a15bf51e6b9a20b48e78b31cf1630ee6879f59da13ad4223e26dfa592b87ab38f1e48b24dde8f7a6bad5925ffcf1a35580c0adb371a75b500fe93605987b0844dc7a0ab636854bc2473be60a68d230f56566d27c578312c56eeb1eca6465250f2dfe4b89daf1cf899c7e8784622ecb5536b72cf0dcce3da9503937c103bed38ac", 0x87, 0xfffffffffffffffa}], 0x80000, &(0x7f0000000480)={[{@minixdf='minixdf'}, {@init_itable='init_itable'}, {@nouid32='nouid32'}, {@data_err_ignore='data_err=ignore'}, {@noauto_da_alloc='noauto_da_alloc'}, {@journal_checksum='journal_checksum'}, {@nobarrier='nobarrier'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}, {@sb={'sb', 0x3d, 0x9}}, {@barrier='barrier'}], [{@pcr={'pcr', 0x3d, 0x6}}, {@smackfsfloor={'smackfsfloor'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'mime_type+'}}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:34:05 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x96a\x80\xc74\xc0+\x91!\xf4w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_pf\x9d/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xde\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') r1 = creat(&(0x7f0000000040)='./file0\x00', 0x4) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x9}, 0x4) 04:34:05 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580700001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:34:05 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580003001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2088.859346][T22719] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2088.859346][T22719] i:0.mC0w[:YH [ 2088.859346][T22719] #<^):4<] [ 2088.928740][T22719] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2088.928740][T22719] LLnCq2] [ 2088.943567][T22719] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 2088.957633][T22719] Error parsing options; rc = [-22] [ 2089.007862][T22711] ecryptfs_parse_options: eCryptfs: unrecognized option [zMfa4+!wUDT'*%I 3 ymħl_pf/i [ 2089.007862][T22711] i:0.mC0w[:YH [ 2089.007862][T22711] #<^):4<] [ 2089.077018][T22711] ecryptfs_parse_options: eCryptfs: unrecognized option [۳smY [ 2089.077018][T22711] LLnCq2] [ 2089.091077][T22711] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:34:05 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580800001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 04:34:05 executing program 2: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580005001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 2089.126492][T22711] Error parsing options; rc = [-22] 04:34:05 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x7256c0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r2) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000000)={0x4, 0x7, 0x7f, 0x20, 0x101, 0x100000001}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) 04:34:05 executing program 5: mknod(&(0x7f0000000180)='./file1\x00', 0xc000, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(r0, 0xc01c64a3, &(0x7f00000002c0)={0x2, 0x400, 0x1ff, 0x1eca, 0x4, 0xc709, 0x80000001}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/178, 0xb2) syz_genetlink_get_family_id$smc(&(0x7f0000000300)='SMC_PNETID\x00') clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4022, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) signalfd4(r1, &(0x7f0000000340)={[0x2]}, 0x8, 0x100800) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x3242c, &(0x7f0000000200)='\xb3\xdf\xfaz\xcfMf\xa3\x1c\x97a\x80\xc74\xc0\t\x00\x00\x00w\xf9U\xa4DT\'\xc1\xb3*%I\x8e\x83\x03 \x883 \xc6\x1eym\x06\xf3\xbc\xf9\x94\x9c\xdc\xc4\xa7\x19\xadl_p\x00\x00/\xae\x1ai\x80\xa0\x8b\xeb\n\xd3i\x8d:\xc2\x040\x96\xf0\x11\x86\xb8.\xa7\x04mC0w\x88[:Y\xf2H\xf5\n#\xab<\xd5^\xfd)\xa0:\xc7\xe2\xc5\xf54<\xa1\xdf\x19,\xbb\xd1\xc7\xfe\xfa\xdb\xb3\xaesm\x82\x13Y\xb2\x8e\xec\nL\xb7Ln\xffCq2') [ 2097.279327][T21895] ================================================================== [ 2097.287431][T21895] BUG: KCSAN: data-race in writeback_sb_inodes / xas_set_mark [ 2097.294899][T21895] [ 2097.297220][T21895] write to 0xffff8880b241589c of 4 bytes by task 22781 on cpu 1: [ 2097.304911][T21895] xas_set_mark+0x140/0x150 [ 2097.309395][T21895] __xa_set_mark+0xdd/0x110 [ 2097.313883][T21895] __set_page_dirty+0x151/0x270 [ 2097.318717][T21895] mark_buffer_dirty+0x26e/0x2b0 [ 2097.323637][T21895] __block_commit_write.isra.0+0x11d/0x170 [ 2097.329425][T21895] block_write_end+0x6d/0x140 [ 2097.334085][T21895] generic_write_end+0x8c/0x1f0 [ 2097.338917][T21895] ext4_da_write_end+0x162/0x670 [ 2097.343841][T21895] generic_perform_write+0x1d7/0x320 [ 2097.349120][T21895] ext4_buffered_write_iter+0x14e/0x280 [ 2097.354646][T21895] ext4_file_write_iter+0xf4/0xd30 [ 2097.359751][T21895] new_sync_write+0x303/0x400 [ 2097.364409][T21895] __vfs_write+0x9e/0xb0 [ 2097.368627][T21895] vfs_write+0x189/0x380 [ 2097.372850][T21895] ksys_write+0xc5/0x1a0 [ 2097.377116][T21895] __x64_sys_write+0x49/0x60 [ 2097.381695][T21895] do_syscall_64+0xc7/0x390 [ 2097.386184][T21895] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2097.392044][T21895] [ 2097.394354][T21895] read to 0xffff8880b241589c of 4 bytes by task 21895 on cpu 0: [ 2097.401960][T21895] writeback_sb_inodes+0x6c9/0xa10 [ 2097.407049][T21895] __writeback_inodes_wb+0xe9/0x1b0 [ 2097.412221][T21895] wb_writeback+0x557/0x6a0 [ 2097.416702][T21895] wb_workfn+0x66b/0x970 [ 2097.420929][T21895] process_one_work+0x424/0x930 [ 2097.425760][T21895] worker_thread+0x9a/0x7e0 [ 2097.430248][T21895] kthread+0x1cb/0x1f0 [ 2097.434302][T21895] ret_from_fork+0x1f/0x30 [ 2097.438687][T21895] [ 2097.440996][T21895] Reported by Kernel Concurrency Sanitizer on: [ 2097.447146][T21895] CPU: 0 PID: 21895 Comm: kworker/u4:4 Not tainted 5.6.0-rc1-syzkaller #0 [ 2097.455629][T21895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.465681][T21895] Workqueue: writeback wb_workfn (flush-8:0) [ 2097.471640][T21895] ================================================================== [ 2097.479682][T21895] Kernel panic - not syncing: panic_on_warn set ... [ 2097.486258][T21895] CPU: 0 PID: 21895 Comm: kworker/u4:4 Not tainted 5.6.0-rc1-syzkaller #0 [ 2097.494728][T21895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.504775][T21895] Workqueue: writeback wb_workfn (flush-8:0) [ 2097.510739][T21895] Call Trace: [ 2097.514031][T21895] dump_stack+0x11d/0x187 [ 2097.518358][T21895] panic+0x210/0x640 [ 2097.522245][T21895] ? vprintk_func+0x89/0x13a [ 2097.526867][T21895] kcsan_report.cold+0xc/0xf [ 2097.531462][T21895] kcsan_setup_watchpoint+0x3fb/0x440 [ 2097.536832][T21895] writeback_sb_inodes+0x6c9/0xa10 [ 2097.541981][T21895] __writeback_inodes_wb+0xe9/0x1b0 [ 2097.547174][T21895] wb_writeback+0x557/0x6a0 [ 2097.551671][T21895] wb_workfn+0x66b/0x970 [ 2097.555911][T21895] process_one_work+0x424/0x930 [ 2097.560759][T21895] worker_thread+0x9a/0x7e0 [ 2097.565259][T21895] ? rescuer_thread+0x6a0/0x6a0 [ 2097.570094][T21895] kthread+0x1cb/0x1f0 [ 2097.574153][T21895] ? kthread_unpark+0xd0/0xd0 [ 2097.578818][T21895] ret_from_fork+0x1f/0x30 [ 2097.584464][T21895] Kernel Offset: disabled [ 2097.588791][T21895] Rebooting in 86400 seconds..