[ 40.703878][ T26] audit: type=1800 audit(1555475796.340:32): pid=7885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 69.812637][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 69.812652][ T26] audit: type=1400 audit(1555475825.530:35): avc: denied { map } for pid=8064 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.89' (ECDSA) to the list of known hosts. 2019/04/17 04:37:11 fuzzer started [ 75.983557][ T26] audit: type=1400 audit(1555475831.700:36): avc: denied { map } for pid=8073 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/04/17 04:37:13 dialing manager at 10.128.0.26:39751 2019/04/17 04:37:14 syscalls: 2463 2019/04/17 04:37:14 code coverage: enabled 2019/04/17 04:37:14 comparison tracing: enabled 2019/04/17 04:37:14 extra coverage: extra coverage is not supported by the kernel 2019/04/17 04:37:14 setuid sandbox: enabled 2019/04/17 04:37:14 namespace sandbox: enabled 2019/04/17 04:37:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/17 04:37:14 fault injection: enabled 2019/04/17 04:37:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/17 04:37:14 net packet injection: enabled 2019/04/17 04:37:14 net device setup: enabled 04:39:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[], 0xfffffcbd) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xffffffb1, &(0x7f0000000140)=[{&(0x7f0000000200)=""/156, 0x33f0f}], 0x1}}], 0x2, 0x0, 0x0) [ 242.165661][ T26] audit: type=1400 audit(1555475997.880:37): avc: denied { map } for pid=8087 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=112 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 242.289480][ T8088] IPVS: ftp: loaded support on port[0] = 21 04:39:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 242.399684][ T8088] chnl_net:caif_netlink_parms(): no params data found [ 242.490159][ T8088] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.507868][ T8088] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.527823][ T8088] device bridge_slave_0 entered promiscuous mode [ 242.548579][ T8088] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.555702][ T8088] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.564019][ T8088] device bridge_slave_1 entered promiscuous mode [ 242.589958][ T8088] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.590716][ T8091] IPVS: ftp: loaded support on port[0] = 21 [ 242.604434][ T8088] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:39:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bond_slave_0\x00'}) [ 242.633904][ T8088] team0: Port device team_slave_0 added [ 242.653501][ T8088] team0: Port device team_slave_1 added [ 242.730730][ T8088] device hsr_slave_0 entered promiscuous mode [ 242.797369][ T8088] device hsr_slave_1 entered promiscuous mode 04:39:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x4, 0x0) [ 242.894389][ T8093] IPVS: ftp: loaded support on port[0] = 21 [ 242.943867][ T8088] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.951149][ T8088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.958857][ T8088] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.965922][ T8088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.098625][ T8091] chnl_net:caif_netlink_parms(): no params data found [ 243.099304][ T8097] IPVS: ftp: loaded support on port[0] = 21 [ 243.143826][ T8088] 8021q: adding VLAN 0 to HW filter on device bond0 04:39:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x3, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x4, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f00000001c0)=0xf2) [ 243.224978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.242576][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.277623][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.297726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 243.338851][ T8088] 8021q: adding VLAN 0 to HW filter on device team0 [ 243.350290][ T8093] chnl_net:caif_netlink_parms(): no params data found [ 243.405347][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.416200][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.423353][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.465388][ T8091] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.473565][ T8091] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.481769][ T8091] device bridge_slave_0 entered promiscuous mode [ 243.490215][ T8091] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.497878][ T8091] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.505725][ T8091] device bridge_slave_1 entered promiscuous mode 04:39:59 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x1}, 0x20) r0 = creat(&(0x7f0000000640)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000980), 0xfffffffffffffd2b) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000900), 0x0, 0x0, 0x0}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) [ 243.521406][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.533261][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.542024][ T8096] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.549136][ T8096] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.577310][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.616796][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 243.625449][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.638648][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.675324][ T8101] IPVS: ftp: loaded support on port[0] = 21 [ 243.700005][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.708033][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.716357][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.724834][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.733103][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.748307][ T8091] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.761340][ T8093] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.766633][ T8105] IPVS: ftp: loaded support on port[0] = 21 [ 243.768840][ T8093] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.782752][ T8093] device bridge_slave_0 entered promiscuous mode [ 243.799435][ T8088] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 243.812324][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 243.820295][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.830135][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.842604][ T8091] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 243.860123][ T8093] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.868497][ T8093] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.876015][ T8093] device bridge_slave_1 entered promiscuous mode [ 243.911192][ T8093] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.923306][ T8093] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 243.950865][ T8091] team0: Port device team_slave_0 added [ 243.958630][ T8093] team0: Port device team_slave_0 added [ 243.964707][ T8097] chnl_net:caif_netlink_parms(): no params data found [ 243.993140][ T8093] team0: Port device team_slave_1 added [ 244.000231][ T8091] team0: Port device team_slave_1 added [ 244.059503][ T8097] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.066596][ T8097] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.075092][ T8097] device bridge_slave_0 entered promiscuous mode [ 244.105156][ T8097] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.112450][ T8097] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.120183][ T8097] device bridge_slave_1 entered promiscuous mode [ 244.179452][ T8091] device hsr_slave_0 entered promiscuous mode [ 244.217109][ T8091] device hsr_slave_1 entered promiscuous mode [ 244.278886][ T8097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.290009][ T8088] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 244.318650][ T8093] device hsr_slave_0 entered promiscuous mode [ 244.398908][ T8093] device hsr_slave_1 entered promiscuous mode [ 244.441178][ T8097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.494859][ T26] audit: type=1400 audit(1555476000.210:38): avc: denied { associate } for pid=8088 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 244.496448][ T8097] team0: Port device team_slave_0 added [ 244.566010][ T8097] team0: Port device team_slave_1 added 04:40:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000040)) 04:40:00 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x103900, 0x0) r1 = dup(r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000040)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pread64(r0, 0x0, 0x1a4, 0x0) [ 244.721390][ T8097] device hsr_slave_0 entered promiscuous mode [ 244.757156][ T8097] device hsr_slave_1 entered promiscuous mode [ 244.843232][ T8105] chnl_net:caif_netlink_parms(): no params data found 04:40:00 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f00000000c0)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8010, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0xa, [], 0x4, &(0x7f0000000000)=[{}, {}, {}, {}], &(0x7f0000000040)=""/10}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) unshare(0x60000000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x120000, 0x0) [ 244.896680][ T8101] chnl_net:caif_netlink_parms(): no params data found [ 244.937521][ T8091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.995593][ T8105] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.004637][ T8105] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.013170][ T8105] device bridge_slave_0 entered promiscuous mode [ 245.023062][ C1] hrtimer: interrupt took 34897 ns [ 245.058591][ T8093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.080059][ T8091] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.088724][ T8105] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.095842][ T8105] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.109875][ T8105] device bridge_slave_1 entered promiscuous mode [ 245.139650][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.147816][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.161990][ T8093] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.194846][ T8143] IPVS: ftp: loaded support on port[0] = 21 [ 245.199088][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.209166][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.217459][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.226007][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.244764][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.251869][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.265354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.274055][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.287329][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.294352][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.302094][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.311910][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.324038][ T8101] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.332619][ T8101] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.340552][ T8101] device bridge_slave_0 entered promiscuous mode [ 245.522386][ T8105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.532697][ T8105] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.541698][ T8101] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.548849][ T8101] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.556396][ T8101] device bridge_slave_1 entered promiscuous mode [ 245.564134][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.573158][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.581630][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.588744][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.596228][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.607303][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.615657][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.622764][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.630494][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.639662][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.776781][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.786179][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.800970][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.811736][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.824169][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.834616][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.849102][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.861644][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.872540][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.882783][ T8144] IPVS: ftp: loaded support on port[0] = 21 [ 245.884998][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.901605][ T8091] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.912856][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.924245][ T8105] team0: Port device team_slave_0 added [ 245.952991][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.960945][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.969851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.979001][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.987694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.996178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.013441][ T8097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.022697][ T8105] team0: Port device team_slave_1 added [ 246.032594][ T8101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.042821][ T8101] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.080402][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.089213][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.099131][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.107579][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.119965][ T8097] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.178695][ T8093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 246.195244][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.205523][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.220931][ T8091] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.260699][ T8105] device hsr_slave_0 entered promiscuous mode [ 246.317545][ T8105] device hsr_slave_1 entered promiscuous mode [ 246.359469][ T8101] team0: Port device team_slave_0 added [ 246.383583][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.393448][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.404115][ T2994] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.411229][ T2994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.451692][ T8101] team0: Port device team_slave_1 added [ 246.468181][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.476228][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.498066][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.506599][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.513753][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.522067][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.531571][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.545141][ T8093] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.607332][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.616055][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.729841][ T8101] device hsr_slave_0 entered promiscuous mode [ 246.787156][ T8101] device hsr_slave_1 entered promiscuous mode [ 246.846499][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.860232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.882761][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.911371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.933733][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.961078][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.984176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.007999][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:40:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0}}], 0x0, 0x0, 0x0}) [ 247.146295][ T8097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.181285][ T8101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.216209][ T8159] binder: 8158:8159 transaction failed 29189/-22, size 0-0 line 2995 04:40:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000001c0), 0x2fd, 0x0) [ 247.261709][ T8105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.282715][ T8103] binder: undelivered TRANSACTION_ERROR: 29189 [ 247.378990][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.400861][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.427330][ T8101] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.443304][ T8105] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.454691][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 04:40:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000140)) [ 247.472805][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.527240][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.535864][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.572111][ T2994] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.579337][ T2994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.587572][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.596339][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.605220][ T2994] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.612410][ T2994] bridge0: port 1(bridge_slave_0) entered forwarding state 04:40:03 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) openat$cgroup_ro(r0, &(0x7f00000002c0)='pids.events\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$net_dm(0x0) getrandom(&(0x7f0000000400)=""/145, 0xfffffffffffffec5, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 247.628289][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.651059][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.666375][ T2994] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.673566][ T2994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.701760][ T26] audit: type=1400 audit(1555476003.420:39): avc: denied { create } for pid=8174 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 247.740029][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.765794][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.776606][ T26] audit: type=1400 audit(1555476003.420:40): avc: denied { write } for pid=8174 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 247.792371][ T2994] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.808269][ T2994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.841032][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.862334][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.873804][ T26] audit: type=1400 audit(1555476003.420:41): avc: denied { read } for pid=8174 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 247.883953][ T2994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.963835][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.992859][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.019696][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.043187][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.071467][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.099984][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.122970][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.151110][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.173650][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.230155][ T8105] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 248.264003][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.303415][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 248.312061][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.338744][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.378308][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.404638][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.431624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.451836][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.493774][ T8101] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 248.531733][ T8101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 248.564167][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 248.577412][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.585693][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.620817][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.650207][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.737329][ T8101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 248.744527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.789101][ T8105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 249.065992][ T26] audit: type=1400 audit(1555476004.780:42): avc: denied { map } for pid=8187 comm="syz-executor.5" path="/dev/binder0" dev="devtmpfs" ino=17604 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 249.096909][ T8188] binder: 8187:8188 ioctl c018620b 0 returned -14 [ 249.130465][ T8188] binder: 8187:8188 ioctl c0306201 0 returned -14 [ 249.161691][ T8191] binder: 8187:8191 ioctl c018620b 0 returned -14 04:40:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:40:06 executing program 3: 04:40:06 executing program 2: 04:40:06 executing program 4: 04:40:06 executing program 5: 04:40:06 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f00000000c0)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8010, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0xa, [], 0x4, &(0x7f0000000000)=[{}, {}, {}, {}], &(0x7f0000000040)=""/10}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140), 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) unshare(0x60000000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x120000, 0x0) 04:40:06 executing program 5: 04:40:06 executing program 4: 04:40:06 executing program 3: socket$packet(0x11, 0x0, 0x300) socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 04:40:06 executing program 2: socket$packet(0x11, 0x3, 0x300) socket$inet_udp(0x2, 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000300)) unshare(0x20600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 04:40:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400000000000000bf0040000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 250.880410][ T8218] binder: 8217:8218 ioctl c0306201 0 returned -14 04:40:06 executing program 5: shmget(0x3, 0x2000, 0x200, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500020000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 250.930077][ T26] audit: type=1400 audit(1555476006.650:43): avc: denied { prog_load } for pid=8220 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 250.967338][ T8225] binder: 8217:8225 transaction failed 29189/-22, size 24-8 line 2995 [ 250.992502][ T8200] IPVS: ftp: loaded support on port[0] = 21 [ 251.013304][ T8218] binder: 8217:8218 BC_INCREFS_DONE u0000000000000000 no match [ 251.048688][ T8227] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 251.058711][ T22] binder: undelivered TRANSACTION_ERROR: 29189 [ 251.077122][ T8225] binder: 8217:8225 BC_INCREFS_DONE u0000000000000000 no match [ 251.085786][ T8218] binder: 8217:8218 transaction failed 29189/-22, size 24-8 line 2995 [ 251.126866][ T2994] binder: undelivered TRANSACTION_ERROR: 29189 04:40:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:40:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="8f"], 0x1, 0x0) 04:40:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000500)=""/164, 0x19a}, {&(0x7f0000000000)=""/248, 0xf8}], 0x6e, 0x0) 04:40:08 executing program 5: shmget(0x3, 0x2000, 0x200, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500020000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:40:08 executing program 3: shmget(0x3, 0x2000, 0x200, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500020000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 04:40:08 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000005b40)=[{{&(0x7f0000000140)=@caif=@rfm={0x25, 0x1, "dd51b11c18f6217c52987edf26a3d4d5"}, 0x80, 0x0, 0x0, &(0x7f00000023c0)=[{0xc}], 0xc}}], 0x1, 0x10) [ 253.236167][ T8239] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:09 executing program 0: arch_prctl$ARCH_GET_GS(0x1004, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x800) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@fragment={0x0, 0x0, 0x0, 0x2, 0x0, 0x200, 0x64}, 0x8) listen(r0, 0x81) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') write(r1, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:40:09 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x2, r0) [ 253.276645][ T8243] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:40:09 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:09 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffffef}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100030e000000030000000000000005000600000000000a000040000000040000a6999c1900000000802100004000000100800010000002000100010000fdff03000000fdac0005000500000000000a001000009aec3f3f6310aa000000b5945cd14b9e00"/112], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x80000000000022c, 0x0) 04:40:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 04:40:09 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 253.527857][ T26] audit: type=1400 audit(1555476009.250:44): avc: denied { map } for pid=8263 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=28604 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 253.662698][ T8277] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 253.712131][ T8277] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 253.734852][ T8277] Error parsing options; rc = [-22] 04:40:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:40:11 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffffef}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100030e000000030000000000000005000600000000000a000040000000040000a6999c1900000000802100004000000100800010000002000100010000fdff03000000fdac0005000500000000000a001000009aec3f3f6310aa000000b5945cd14b9e00"/112], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x80000000000022c, 0x0) 04:40:11 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 04:40:11 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:11 executing program 0: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") timerfd_settime(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 04:40:11 executing program 0: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$selinux_access(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) 04:40:11 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x61c0) syz_open_procfs(0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)={0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:40:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000280)='./file0\x00', 0x0) socket$unix(0x1, 0x1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 04:40:11 executing program 0: 04:40:12 executing program 0: 04:40:12 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 04:40:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:13 executing program 0: 04:40:13 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x61c0) syz_open_procfs(0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)={0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:40:13 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:13 executing program 5: 04:40:13 executing program 0: 04:40:13 executing program 5: 04:40:13 executing program 0: 04:40:13 executing program 5: 04:40:13 executing program 0: 04:40:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 04:40:15 executing program 0: 04:40:15 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:15 executing program 5: 04:40:15 executing program 2: 04:40:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:15 executing program 5: 04:40:15 executing program 2: 04:40:15 executing program 0: 04:40:15 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:15 executing program 5: 04:40:15 executing program 2: 04:40:17 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 04:40:17 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:17 executing program 0: 04:40:17 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:17 executing program 5: 04:40:17 executing program 2: 04:40:17 executing program 5: 04:40:17 executing program 2: 04:40:17 executing program 0: 04:40:17 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:17 executing program 5: 04:40:17 executing program 2: mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4001, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') syz_open_dev$loop(0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 262.057339][ T12] libceph: connect [d::]:6789 error -101 [ 262.063325][ T12] libceph: mon0 [d::]:6789 connect error [ 262.092113][ T12] libceph: connect [d::]:6789 error -101 [ 262.105451][ T12] libceph: mon0 [d::]:6789 connect error [ 262.123545][ T22] libceph: connect [d::]:6789 error -101 [ 262.129495][ T22] libceph: mon0 [d::]:6789 connect error [ 263.357815][ T22] libceph: connect [d::]:6789 error -101 [ 263.363583][ T22] libceph: mon0 [d::]:6789 connect error 04:40:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) tkill(r1, 0x8001004000000016) 04:40:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:19 executing program 0: r0 = inotify_init1(0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_nlink(r1, 0x0, &(0x7f00000001c0)={'L-', 0x80000001}, 0x28, 0x0) readv(r0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(&(0x7f00000000c0)='./control\x00', 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000200)='./control\x00', 0x0, 0x1000, 0x0) inotify_add_watch(r0, &(0x7f00000007c0)='./control\x00', 0xa4000961) open(&(0x7f0000000840)='./control\x00', 0x4401, 0x0) 04:40:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x2}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}}) 04:40:19 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:19 executing program 2: mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4001, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') syz_open_dev$loop(0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 04:40:19 executing program 5: mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4001, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') syz_open_dev$loop(0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 04:40:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x2}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000003c0)={0x0, r1}) 04:40:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0xc008af12, &(0x7f0000000000)) 04:40:19 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x11c, r4, 0x204, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="50e71f141d1c9ebc8f58c4f2d53270cd"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x85}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x45}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc8ee}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x27}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x80}, 0x40) fadvise64(r3, 0x0, 0x7, 0x4) [ 264.001496][ T8539] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 264.048136][ T8540] QAT: Invalid ioctl [ 264.054766][ T8539] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 264.069020][ T8540] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 264.074676][ T8539] Error parsing options; rc = [-22] [ 264.117215][ T8540] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 264.145142][ T8540] Error parsing options; rc = [-22] [ 264.173949][ T8545] QAT: Invalid ioctl [ 264.317867][ T22] libceph: connect [d::]:6789 error -101 [ 264.323633][ T22] libceph: mon0 [d::]:6789 connect error [ 266.398183][ T22] libceph: mon1 [::b]:6789 socket error on read 04:40:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) tkill(r1, 0x8001004000000016) 04:40:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:40:22 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:40:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0xc008af12, &(0x7f0000000000)) 04:40:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x11c, r4, 0x204, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="50e71f141d1c9ebc8f58c4f2d53270cd"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x85}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x45}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc8ee}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x27}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x80}, 0x40) fadvise64(r3, 0x0, 0x7, 0x4) [ 266.752211][ T8556] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 266.816320][ T8556] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 266.817704][ T8571] QAT: Invalid ioctl [ 266.858894][ T8556] Error parsing options; rc = [-22] [ 268.318341][ T22] libceph: connect [d::]:6789 error -101 [ 268.324094][ T22] libceph: mon0 [d::]:6789 connect error [ 269.357170][ T22] libceph: connect [d::]:6789 error -101 [ 269.362934][ T22] libceph: mon0 [d::]:6789 connect error [ 270.317245][ T22] libceph: connect [d::]:6789 error -101 [ 270.322990][ T22] libceph: mon0 [d::]:6789 connect error [ 272.398169][ T22] libceph: mon1 [::b]:6789 socket closed (con state CONNECTING) [ 273.366957][ T22] libceph: mon1 [::b]:6789 socket error on read [ 274.317705][ T22] libceph: connect [d::]:6789 error -101 [ 274.323836][ T22] libceph: mon0 [d::]:6789 connect error [ 275.357170][ T22] libceph: connect [d::]:6789 error -101 [ 275.362946][ T22] libceph: mon0 [d::]:6789 connect error [ 276.318239][ T22] libceph: connect [d::]:6789 error -101 [ 276.324015][ T22] libceph: mon0 [d::]:6789 connect error [ 278.397203][ T22] libceph: mon1 [::b]:6789 socket error on write [ 280.317409][ T22] libceph: connect [d::]:6789 error -101 [ 280.323168][ T22] libceph: mon0 [d::]:6789 connect error [ 281.357249][ T22] libceph: connect [d::]:6789 error -101 [ 281.363000][ T22] libceph: mon0 [d::]:6789 connect error [ 282.317204][ T22] libceph: connect [d::]:6789 error -101 [ 282.322923][ T22] libceph: mon0 [d::]:6789 connect error [ 284.397471][ T22] libceph: mon1 [::b]:6789 socket closed (con state CONNECTING) [ 286.317390][ T22] libceph: connect [d::]:6789 error -101 [ 286.323352][ T22] libceph: mon0 [d::]:6789 connect error [ 287.357230][ T22] libceph: connect [d::]:6789 error -101 [ 287.363397][ T22] libceph: mon0 [d::]:6789 connect error [ 288.317185][ T22] libceph: connect [d::]:6789 error -101 [ 288.323511][ T22] libceph: mon0 [d::]:6789 connect error [ 290.397468][ T22] libceph: mon1 [::b]:6789 socket error on write [ 292.320527][ T22] libceph: connect [d::]:6789 error -101 [ 292.326681][ T22] libceph: mon0 [d::]:6789 connect error [ 293.357255][ T22] libceph: connect [d::]:6789 error -101 [ 293.363179][ T22] libceph: mon0 [d::]:6789 connect error [ 294.317252][ T22] libceph: connect [d::]:6789 error -101 [ 294.323360][ T22] libceph: mon0 [d::]:6789 connect error [ 296.397242][ T22] libceph: mon1 [::b]:6789 socket closed (con state CONNECTING) [ 298.317446][ T22] libceph: connect [d::]:6789 error -101 [ 298.323184][ T22] libceph: mon0 [d::]:6789 connect error [ 299.357406][ T22] libceph: connect [d::]:6789 error -101 [ 299.363174][ T22] libceph: mon0 [d::]:6789 connect error [ 300.317219][ T22] libceph: connect [d::]:6789 error -101 [ 300.322964][ T22] libceph: mon0 [d::]:6789 connect error [ 302.397394][ T22] libceph: mon1 [::b]:6789 socket error on write [ 304.317379][ T22] libceph: connect [d::]:6789 error -101 [ 304.323148][ T22] libceph: mon0 [d::]:6789 connect error [ 305.357249][ T22] libceph: connect [d::]:6789 error -101 [ 305.363022][ T22] libceph: mon0 [d::]:6789 connect error [ 306.317221][ T22] libceph: connect [d::]:6789 error -101 [ 306.322960][ T22] libceph: mon0 [d::]:6789 connect error [ 308.397367][ T22] libceph: mon1 [::b]:6789 socket error on write [ 309.366858][ T22] libceph: mon1 [::b]:6789 socket closed (con state CONNECTING) [ 310.317742][ T22] libceph: connect [d::]:6789 error -101 [ 310.323439][ T22] libceph: mon0 [d::]:6789 connect error [ 311.357483][ T22] libceph: connect [d::]:6789 error -101 [ 311.363196][ T22] libceph: mon0 [d::]:6789 connect error [ 312.317039][ T22] libceph: connect [d::]:6789 error -101 [ 312.322773][ T22] libceph: mon0 [d::]:6789 connect error [ 314.397181][ T22] libceph: mon1 [::b]:6789 socket closed (con state CONNECTING) [ 316.317372][ T22] libceph: connect [d::]:6789 error -101 [ 316.323102][ T22] libceph: mon0 [d::]:6789 connect error [ 317.357278][ T22] libceph: connect [d::]:6789 error -101 [ 317.363055][ T22] libceph: mon0 [d::]:6789 connect error [ 318.317101][ T22] libceph: connect [d::]:6789 error -101 [ 318.322820][ T22] libceph: mon0 [d::]:6789 connect error [ 319.366971][ T22] libceph: mon1 [::b]:6789 socket error on read [ 321.357361][ T22] libceph: mon1 [::b]:6789 socket closed (con state CONNECTING) [ 322.330113][ T22] libceph: connect [d::]:6789 error -101 [ 322.335834][ T22] libceph: mon0 [d::]:6789 connect error [ 323.357204][ T22] libceph: connect [d::]:6789 error -101 [ 323.362932][ T22] libceph: mon0 [d::]:6789 connect error 04:41:19 executing program 2: mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4001, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') syz_open_dev$loop(0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 04:41:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x11c, r4, 0x204, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="50e71f141d1c9ebc8f58c4f2d53270cd"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x85}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x45}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc8ee}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x27}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x80}, 0x40) fadvise64(r3, 0x0, 0x7, 0x4) 04:41:19 executing program 5: 04:41:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:19 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) tkill(r1, 0x8001004000000016) 04:41:19 executing program 5: 04:41:19 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 324.177398][ T8591] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:19 executing program 5: [ 324.265807][ T8591] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:20 executing program 5: [ 324.342978][ T8591] Error parsing options; rc = [-22] 04:41:20 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:20 executing program 5: [ 326.456509][ T8621] IPVS: ftp: loaded support on port[0] = 21 [ 326.496513][ T8152] device bridge_slave_1 left promiscuous mode [ 326.503433][ T8152] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.554985][ T8152] device bridge_slave_0 left promiscuous mode [ 326.566176][ T8152] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.489816][ T8152] device hsr_slave_1 left promiscuous mode [ 328.552276][ T8152] device hsr_slave_0 left promiscuous mode [ 328.613017][ T8152] team0 (unregistering): Port device team_slave_1 removed [ 328.624608][ T8152] team0 (unregistering): Port device team_slave_0 removed [ 328.636616][ T8152] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 328.681309][ T8152] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 328.763265][ T8152] bond0 (unregistering): Released all slaves [ 328.914291][ T8621] chnl_net:caif_netlink_parms(): no params data found [ 328.946662][ T8621] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.953916][ T8621] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.961787][ T8621] device bridge_slave_0 entered promiscuous mode [ 328.970043][ T8621] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.977197][ T8621] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.984743][ T8621] device bridge_slave_1 entered promiscuous mode [ 329.006086][ T8621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 329.016233][ T8621] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 329.036159][ T8621] team0: Port device team_slave_0 added [ 329.043435][ T8621] team0: Port device team_slave_1 added [ 329.109581][ T8621] device hsr_slave_0 entered promiscuous mode [ 329.147153][ T8621] device hsr_slave_1 entered promiscuous mode [ 329.277133][ T8621] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.284224][ T8621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.291611][ T8621] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.298711][ T8621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.349918][ T8621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.364213][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.373629][ T8103] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.381801][ T8103] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.395929][ T8621] 8021q: adding VLAN 0 to HW filter on device team0 [ 329.408794][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.417467][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.424524][ T8103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.450030][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.459514][ T8106] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.466593][ T8106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.475598][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 329.485204][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 329.503918][ T8621] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 329.514761][ T8621] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 329.527872][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 329.535728][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.545493][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.566002][ T8621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.574164][ T3480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:41:25 executing program 2: mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4001, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') syz_open_dev$loop(0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 04:41:25 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:25 executing program 5: 04:41:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x11c, r4, 0x204, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="50e71f141d1c9ebc8f58c4f2d53270cd"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x85}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x45}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc8ee}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x27}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x80}, 0x40) fadvise64(r3, 0x0, 0x7, 0x4) 04:41:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:25 executing program 5: [ 329.732967][ T8633] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:25 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 329.844807][ T8633] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:25 executing program 2: 04:41:25 executing program 5: 04:41:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x11c, r4, 0x204, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="50e71f141d1c9ebc8f58c4f2d53270cd"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x85}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x45}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc8ee}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x27}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x80}, 0x40) [ 329.951957][ T8633] Error parsing options; rc = [-22] 04:41:25 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:25 executing program 5: 04:41:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x346) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) [ 330.095681][ T8672] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 330.195874][ T8672] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 330.286624][ T8672] Error parsing options; rc = [-22] [ 330.335508][ T8675] QAT: Invalid ioctl 04:41:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:28 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000180), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8020000008, &(0x7f00008d4fe4)={0xa, 0x2004e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(r1, 0x4, 0x800) r2 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x8000fffffffe) 04:41:28 executing program 2: 04:41:28 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:28 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:28 executing program 2: [ 332.818843][ T8697] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 332.844172][ T8699] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 332.847380][ T8707] QAT: Invalid ioctl 04:41:28 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 332.929690][ T8699] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:28 executing program 2: 04:41:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 333.047104][ T8699] Error parsing options; rc = [-22] [ 333.140045][ T8725] cgroup: fork rejected by pids controller in /syz4 [ 333.207047][ T8735] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 333.252548][ T8735] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 333.280017][ T8738] QAT: Invalid ioctl [ 333.312713][ T8735] Error parsing options; rc = [-22] [ 333.378619][ T26] audit: type=1800 audit(1555476089.100:45): pid=8719 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16726 res=0 04:41:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:31 executing program 2: 04:41:31 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:31 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(0xffffffffffffffff, r0) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:41:31 executing program 5: 04:41:31 executing program 5: [ 336.001193][ T8749] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:31 executing program 2: [ 336.047430][ T8759] QAT: Invalid ioctl [ 336.070268][ T8749] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:31 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(0xffffffffffffffff, r0) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:31 executing program 5: 04:41:31 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) [ 336.157564][ T8749] Error parsing options; rc = [-22] 04:41:31 executing program 2: 04:41:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:41:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x8001004000000016) 04:41:34 executing program 5: 04:41:34 executing program 2: 04:41:34 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:34 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(0xffffffffffffffff, r0) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:34 executing program 2: 04:41:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') read$eventfd(r0, 0x0, 0x0) [ 339.125088][ T8887] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 339.195512][ T8887] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:35 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000e80)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08"], 0x10) sendfile(r3, r0, 0x0, 0x8080fffffffe) 04:41:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 04:41:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 339.256983][ T8887] Error parsing options; rc = [-22] [ 339.257549][ T8896] QAT: Invalid ioctl 04:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 339.361667][ T26] audit: type=1400 audit(1555476095.080:46): avc: denied { map } for pid=9008 comm="syz-executor.5" path="/proc/9008/net/netlink" dev="proc" ino=4026533564 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 [ 339.510390][ T9026] QAT: Invalid ioctl [ 339.527942][ T9023] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 339.596633][ T9023] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 339.645086][ T9023] Error parsing options; rc = [-22] 04:41:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x8001004000000016) 04:41:36 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40000041) 04:41:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:36 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x400000000000005, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0), 0x4) [ 341.295349][ T9045] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121800, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 341.345824][ T9045] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x3, r2}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 341.410049][ T9045] Error parsing options; rc = [-22] 04:41:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 341.564713][ T9091] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 341.566230][ T9094] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 341.575912][ T9099] QAT: Invalid ioctl 04:41:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @broadcast}}, {{0x2, 0x0, @local}}}, 0x108) [ 341.623616][ T9091] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 341.677192][ T9103] QAT: Invalid ioctl [ 341.682196][ T9094] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 341.695048][ T9091] Error parsing options; rc = [-22] [ 341.776611][ T9094] Error parsing options; rc = [-22] 04:41:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x8001004000000016) 04:41:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x7fffffff, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x401, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x4}, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 04:41:38 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:38 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000080)="86c4b4d18b5923118387e43224a5b05ae0cde80f7879b530c7ebfdb7237390d592a4c103eef805db28983a403edd6ce1db2997cee4855eeaeff223ce3e58ffface9a9f9215c436c9f82c9579b4634abcb8956a76229edb174308c9d7466dc71db0bfca93a8437e4d1e769e0c8e1e1d7e76d7", 0x72) r1 = socket(0x40000000001e, 0x1, 0x0) getsockopt(r1, 0x800000010f, 0x0, 0x0, &(0x7f0000000040)) [ 343.279533][ T9130] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:39 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000080)="86c4b4d18b5923118387e43224a5b05ae0cde80f7879b530c7ebfdb7237390d592a4c103eef805db28983a403edd6ce1db2997cee4855eeaeff223ce3e58ffface9a9f9215c436c9f82c9579b4634abcb8956a76229edb174308c9d7466dc71db0bfca93a8437e4d1e769e0c8e1e1d7e76d7", 0x72) r1 = socket(0x40000000001e, 0x1, 0x0) getsockopt(r1, 0x800000010f, 0x0, 0x0, &(0x7f0000000040)) [ 343.325145][ T9130] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x109200, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 343.391110][ T9130] Error parsing options; rc = [-22] 04:41:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) preadv(r0, &(0x7f00000002c0)=[{&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f00000000c0)=""/13, 0xd}], 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={0x0, 0x207, 0x1db}, 0x0, 0x0, &(0x7f00000013c0)=""/4096) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000340)) 04:41:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r2, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), 0x0, 0x8) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x2, 0x7cab, 0x1ff, 0x0, 0x2, 0x1}, 0x6, 0x6, 0xffffffffffffffc0}) 04:41:39 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 343.547832][ T9251] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 343.573210][ T9251] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 343.623198][ T9251] Error parsing options; rc = [-22] [ 343.745652][ T9259] Unknown ioctl -2147204141 [ 344.409769][ T26] audit: type=1804 audit(1555476100.130:47): pid=9269 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir207269970/syzkaller.i6lpgu/40/file1" dev="sda1" ino=16777 res=1 [ 344.446806][ T9269] Unknown ioctl -2147204141 [ 344.452664][ T26] audit: type=1804 audit(1555476100.160:48): pid=9269 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir207269970/syzkaller.i6lpgu/40/file1" dev="sda1" ino=16787 res=1 04:41:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:41 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) preadv(r0, &(0x7f00000002c0)=[{&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f00000000c0)=""/13, 0xd}], 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={0x0, 0x207, 0x1db}, 0x0, 0x0, &(0x7f00000013c0)=""/4096) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000340)) 04:41:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r2, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), 0x0, 0x8) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x2, 0x7cab, 0x1ff, 0x0, 0x2, 0x1}, 0x6, 0x6, 0xffffffffffffffc0}) [ 345.375414][ T9372] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 345.415368][ T9372] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 345.432168][ T9372] Error parsing options; rc = [-22] 04:41:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 345.504173][ T9370] Unknown ioctl -2147204141 04:41:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:41 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(0x0, 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 345.566399][ T9488] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 345.625077][ T9488] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 345.719395][ T9488] Error parsing options; rc = [-22] 04:41:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xc0200, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty}, &(0x7f0000000080)=0xc) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d, r3}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x6, 0xca2, 0xffff, {}, {0x0, 0x7530}, {0x3, 0x80, 0x1, 0x4}, 0x1, @canfd={{0x0, 0xf000000000000000, 0x10001, 0x3cb5}, 0x4, 0x3, 0x0, 0x0, "219843fd10761c6bca3faee47d2c861c2eeeb7cd913e1d73f1b28acb862d92363593e18dfde59099c36e9be2bae8f28346ef38e197d7bbe71a66e3cea6cae21b"}}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x800) accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 04:41:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="20d595522ef874a410f142dec8016e0ab49c", 0x12) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 345.935030][ T9575] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 345.947053][ T9575] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 345.966797][ T9575] Error parsing options; rc = [-22] 04:41:41 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(0x0, 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 346.004657][ T26] audit: type=1400 audit(1555476101.720:49): avc: denied { name_bind } for pid=9599 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 346.136301][ T26] audit: type=1400 audit(1555476101.730:50): avc: denied { node_bind } for pid=9599 comm="syz-executor.2" saddr=::1 src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 346.147718][ T9620] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r2, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), 0x0, 0x8) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x2, 0x7cab, 0x1ff, 0x0, 0x2, 0x1}, 0x6, 0x6, 0xffffffffffffffc0}) 04:41:41 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x8001004000000016) 04:41:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:42 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x8001004000000016) [ 346.297441][ T26] audit: type=1400 audit(1555476101.780:51): avc: denied { name_connect } for pid=9599 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 04:41:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 346.345717][ T9620] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 346.388128][ T9620] Error parsing options; rc = [-22] 04:41:42 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x8001004000000016) 04:41:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xc0200, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty}, &(0x7f0000000080)=0xc) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d, r3}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x6, 0xca2, 0xffff, {}, {0x0, 0x7530}, {0x3, 0x80, 0x1, 0x4}, 0x1, @canfd={{0x0, 0xf000000000000000, 0x10001, 0x3cb5}, 0x4, 0x3, 0x0, 0x0, "219843fd10761c6bca3faee47d2c861c2eeeb7cd913e1d73f1b28acb862d92363593e18dfde59099c36e9be2bae8f28346ef38e197d7bbe71a66e3cea6cae21b"}}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x800) accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 04:41:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:42 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(0x0, 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 346.525721][ T9653] Unknown ioctl -2147204141 04:41:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:42 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r2, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), 0x0, 0x8) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x2, 0x7cab, 0x1ff, 0x0, 0x2, 0x1}, 0x6, 0x6, 0xffffffffffffffc0}) 04:41:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300), 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:42 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:42 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:42 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file0/file0\x00', r0, &(0x7f0000000180)='./file0/file1\x00') r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) write$9p(r1, &(0x7f00000002c0)="c3df63e237ea80374c4befa3bb8cd88f7016009b982b08c4f1d4538640781886d1bacb72ec0ffbacc6826a92a266a54edb2cd4a2ffa152167ff479c15b75d7e3d988dbc4a5a26926b12cfded9c36856a6bc0e0312fe2763c86bfdf95acd9b9e3adfe5df9cf00f30c3178748176006be4ea2fcc0f3d330f51ff98f2c71e487b213fdf1ab95577287e581ac228e420b053078b1bec45a22b04bbbdd77ae2969ecda26e626f77dfe0762315496fdf1e96668c02255fb3574e538c40", 0xba) symlinkat(&(0x7f0000000080)='./file1\x00', r1, &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 04:41:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300), 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:42 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:42 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x38a8, 0x4000) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xc00000}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e23, 0x3, @remote, 0x9}}, 0x0, 0x800, 0xa973, 0x3ff, 0x7e}, &(0x7f0000000180)=0x98) socket$inet(0x10, 0x2000000003, 0x0) 04:41:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:43 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 347.303094][ T9883] Unknown ioctl -2147204141 04:41:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300), 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 347.364502][ T9998] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 347.411077][ T9998] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 347.439268][ T9998] Error parsing options; rc = [-22] 04:41:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), 0x0, 0x8) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) 04:41:43 executing program 2: r0 = socket(0x10, 0x802, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) timer_create(0x0, &(0x7f0000000380)={0x0, 0x6, 0x2, @thr={&(0x7f0000000280)="52edf5ff098e2ad8b59b7971ce11e22a5dd41686d6553964cc416faa5ab71968eaa1a5bf418436bb506cf1b789349ea3671d57e67febad8124f8f774443a68a70a60be2ab5b7a67dae6b36b32757b0c7f615fb8fdf87297b9c542ebdbbfb0c860ee549decb283546401565a43da7bd6b5b0e820518cf91fb62480e749e4cb6644c46f1558812bc8fd447fde3cb71fad7b51ca85c91ba39fb1129fbc919547c0c3aad9c8a39e65ce668fe8d1f0132e83e780459f1fc21acfaf1f89e106c1ce1748bfa92eaffb38ea7a4e6c1dc6ba79cfea54fb1f7529067dbaeed44f736af1c2d54c0395bb90a13", &(0x7f0000000080)="dc93b19bff66c116a16725575608e33feb461c71428cae6887658d0445aa5ca2ec3642cd76edf74e9abb827321cc3f5bea549ea3b3e2cbafea957b4f1694daa3254933367bbf0a54c756ec3f71d2f1d5d75d776966cd86de59dda6"}}, &(0x7f00000003c0)=0x0) timer_getoverrun(r3) getsockname$unix(r0, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) sendmmsg$unix(r0, &(0x7f0000f72eb0)=[{&(0x7f0000f72000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f00003ff000), 0x0, &(0x7f0000f72000)=[@cred={0x1c}], 0x20}], 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x600, 0x0) 04:41:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522ef874a410", 0x9) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:43 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:43 executing program 2: r0 = syz_open_dev$midi(0x0, 0x0, 0x301002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000100)={0x5, 0x1da, 0x1, 0x1, 0x3a, 0x6, 0x0, 0x7fe000, 0xc4542, 0x2, 0x1ff, 0xfffffffffffffff8, 0x5, 0xfffffffffffffc00, 0x13fc, 0xffffffff, 0x3ff, 0x7, 0x7, 0x10000, 0x1ff, 0x5, 0x8, 0x100000001, 0x8, 0x0, 0x400, 0x7fff, 0x2ae800000000000, 0x9, 0x5, 0x3, 0x4, 0x2, 0x36, 0x80, 0x40, 0x400, 0x0, 0x1, 0x3, @perf_bp={&(0x7f00000000c0), 0x8}, 0x208, 0x100000000, 0x100000001, 0x7, 0x4, 0x8, 0x8}, r2, 0xe, r0, 0x2) mknod(&(0x7f0000000280)='./file0\x00', 0x200, 0x3) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @rose}, [@rose, @default, @rose, @default, @bcast, @rose, @rose, @default]}, &(0x7f0000000240)=0x48) [ 348.009104][T10116] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 348.045277][T10116] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 348.074043][T10116] Error parsing options; rc = [-22] 04:41:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 348.136240][T10179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:41:43 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(0xffffffffffffffff, r0) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 348.215685][T10232] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 348.221187][T10237] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:41:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300), 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:44 executing program 2: r0 = syz_open_dev$midi(0x0, 0x0, 0x301002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000100)={0x5, 0x1da, 0x1, 0x1, 0x3a, 0x6, 0x0, 0x7fe000, 0xc4542, 0x2, 0x1ff, 0xfffffffffffffff8, 0x5, 0xfffffffffffffc00, 0x13fc, 0xffffffff, 0x3ff, 0x7, 0x7, 0x10000, 0x1ff, 0x5, 0x8, 0x100000001, 0x8, 0x0, 0x400, 0x7fff, 0x2ae800000000000, 0x9, 0x5, 0x3, 0x4, 0x2, 0x36, 0x80, 0x40, 0x400, 0x0, 0x1, 0x3, @perf_bp={&(0x7f00000000c0), 0x8}, 0x208, 0x100000000, 0x100000001, 0x7, 0x4, 0x8, 0x8}, r2, 0xe, r0, 0x2) mknod(&(0x7f0000000280)='./file0\x00', 0x200, 0x3) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @rose}, [@rose, @default, @rose, @default, @bcast, @rose, @rose, @default]}, &(0x7f0000000240)=0x48) [ 348.295738][T10232] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 348.341818][T10232] Error parsing options; rc = [-22] [ 348.413429][T10252] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:41:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:44 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(0xffffffffffffffff, r0) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300), 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), 0x0, 0x8) 04:41:44 executing program 2: r0 = syz_open_dev$midi(0x0, 0x0, 0x301002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000100)={0x5, 0x1da, 0x1, 0x1, 0x3a, 0x6, 0x0, 0x7fe000, 0xc4542, 0x2, 0x1ff, 0xfffffffffffffff8, 0x5, 0xfffffffffffffc00, 0x13fc, 0xffffffff, 0x3ff, 0x7, 0x7, 0x10000, 0x1ff, 0x5, 0x8, 0x100000001, 0x8, 0x0, 0x400, 0x7fff, 0x2ae800000000000, 0x9, 0x5, 0x3, 0x4, 0x2, 0x36, 0x80, 0x40, 0x400, 0x0, 0x1, 0x3, @perf_bp={&(0x7f00000000c0), 0x8}, 0x208, 0x100000000, 0x100000001, 0x7, 0x4, 0x8, 0x8}, r2, 0xe, r0, 0x2) mknod(&(0x7f0000000280)='./file0\x00', 0x200, 0x3) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @rose}, [@rose, @default, @rose, @default, @bcast, @rose, @rose, @default]}, &(0x7f0000000240)=0x48) [ 348.887248][T10260] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 348.897264][T10267] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 348.908442][T10260] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:44 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300), 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 348.941771][T10260] Error parsing options; rc = [-22] 04:41:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:44 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(0xffffffffffffffff, r0) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595522e", 0x5) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 349.080938][T10380] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.117277][T10380] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:44 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 349.163266][T10380] Error parsing options; rc = [-22] 04:41:45 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:45 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 349.275423][T10392] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.345720][T10392] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 349.376947][T10392] Error parsing options; rc = [-22] 04:41:45 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 349.403420][T10465] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.433936][T10465] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 349.455454][T10465] Error parsing options; rc = [-22] [ 349.534932][T10513] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.550939][T10513] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 349.565215][T10513] Error parsing options; rc = [-22] 04:41:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) 04:41:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000094) syz_emit_ethernet(0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa09000000aa0086dd601bfc97002b8800fe80000000005edeac3dfbba4100000000000000000000ff02000000000000000000000000000100004e20002b9078e29607149378d33e1db1c73936c77aa3f7fa682a042bd36823686253665a70e889ff71f611aaf0b826c7359ec7b951a83fb3d62bcfbf54ef8ab9216fba58d80c9547e08f96216922914031d5537816a04a76f4dbc45ea9469a85d2b4d703294480612a9f3457623ba61c35118f7483158ad0ca2f9ef1f323932a566304052b2fb43b66d87cb709c91fd429b89bddbb35701f943e26f9"], 0x0) 04:41:45 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:45 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 349.810552][T10525] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.832269][T10525] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) [ 349.891918][T10525] Error parsing options; rc = [-22] 04:41:45 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:45 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 350.207511][T10647] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 350.309867][T10647] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 350.424084][T10647] Error parsing options; rc = [-22] 04:41:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000094) syz_emit_ethernet(0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa09000000aa0086dd601bfc97002b8800fe80000000005edeac3dfbba4100000000000000000000ff02000000000000000000000000000100004e20002b9078e29607149378d33e1db1c73936c77aa3f7fa682a042bd36823686253665a70e889ff71f611aaf0b826c7359ec7b951a83fb3d62bcfbf54ef8ab9216fba58d80c9547e08f96216922914031d5537816a04a76f4dbc45ea9469a85d2b4d703294480612a9f3457623ba61c35118f7483158ad0ca2f9ef1f323932a566304052b2fb43b66d87cb709c91fd429b89bddbb35701f943e26f9"], 0x0) 04:41:46 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 350.628416][T10779] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 350.677173][T10779] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 350.764638][T10779] Error parsing options; rc = [-22] 04:41:46 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 350.845934][T10881] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 350.924702][T10881] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 351.020944][T10881] Error parsing options; rc = [-22] 04:41:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000094) syz_emit_ethernet(0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa09000000aa0086dd601bfc97002b8800fe80000000005edeac3dfbba4100000000000000000000ff02000000000000000000000000000100004e20002b9078e29607149378d33e1db1c73936c77aa3f7fa682a042bd36823686253665a70e889ff71f611aaf0b826c7359ec7b951a83fb3d62bcfbf54ef8ab9216fba58d80c9547e08f96216922914031d5537816a04a76f4dbc45ea9469a85d2b4d703294480612a9f3457623ba61c35118f7483158ad0ca2f9ef1f323932a566304052b2fb43b66d87cb709c91fd429b89bddbb35701f943e26f9"], 0x0) 04:41:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:46 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 351.219669][T11005] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 351.302934][T11005] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 351.368680][T11005] Error parsing options; rc = [-22] 04:41:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:47 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 351.578466][T11120] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 351.653384][T11120] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 351.696967][T11120] Error parsing options; rc = [-22] 04:41:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 351.875304][T11236] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 351.942845][T11236] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 351.985497][T11236] Error parsing options; rc = [-22] 04:41:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:49 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000500)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004}, 0x20000804) 04:41:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d595", 0x3) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 354.113264][T11252] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 354.174977][T11252] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:49 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)=ANY=[@ANYBLOB="62b45603ed0639"]) [ 354.217492][T11252] Error parsing options; rc = [-22] 04:41:50 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 354.318104][T11368] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 354.374076][T11368] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 354.458332][T11368] Error parsing options; rc = [-22] [ 354.582198][T11437] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 354.624999][T11437] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 354.655279][T11437] Error parsing options; rc = [-22] 04:41:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:52 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') close(r0) [ 357.314394][T11504] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100001a000009000000000100428746c8b3b0a91f638d0c9be80000000070eed81556252dd5bca6db408bab04c91b1438751ab1eda26baa74725497dde342d9c0b485d9152d7085a17d1f7af0997d9f34408f1c1c97689de1a73dea05e029456194e652540ffeccb90649d41c03e0be5a87ca738fea7b"], 0x99) [ 357.375091][T11504] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:53 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 357.472878][T11504] Error parsing options; rc = [-22] 04:41:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 357.559647][T11624] SELinux: failed to load policy 04:41:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100001a000009000000000100428746c8b3b0a91f638d0c9be80000000070eed81556252dd5bca6db408bab04c91b1438751ab1eda26baa74725497dde342d9c0b485d9152d7085a17d1f7af0997d9f34408f1c1c97689de1a73dea05e029456194e652540ffeccb90649d41c03e0be5a87ca738fea7b"], 0x99) [ 357.614962][T11623] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 357.676382][T11623] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 357.770729][T11623] Error parsing options; rc = [-22] [ 357.781199][T11734] SELinux: failed to load policy 04:41:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100), &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:56 executing program 5: socket$inet6(0xa, 0x1, 0x0) r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:56 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:56 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) munmap(&(0x7f00003ff000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000000000000000001f00"/31]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000300)) 04:41:56 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 360.423823][T11744] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 360.480131][T11744] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 360.493748][T11744] Error parsing options; rc = [-22] 04:41:56 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 360.585173][T11820] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 360.635488][T11820] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 360.686957][T11820] Error parsing options; rc = [-22] 04:41:56 executing program 5: r0 = open(0x0, 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:56 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 360.717015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 360.717060][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 360.728742][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:41:56 executing program 5: r0 = open(0x0, 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 360.841168][T11873] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 360.924954][T11873] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 360.980598][T11873] Error parsing options; rc = [-22] [ 361.036798][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 361.042602][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 361.117184][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 361.124168][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:41:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100), &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:59 executing program 5: r0 = open(0x0, 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:41:59 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:41:59 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:41:59 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) munmap(&(0x7f00003ff000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000000000000000001f00"/31]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000300)) [ 363.553463][T11995] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:59 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 363.599753][T11995] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 363.662135][T11995] Error parsing options; rc = [-22] 04:41:59 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 363.772937][T12072] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:41:59 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 363.832073][T12072] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 363.916792][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 363.922647][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 363.935701][T12072] Error parsing options; rc = [-22] 04:41:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:41:59 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 364.075658][T12161] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 364.142848][T12161] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 364.220743][T12161] Error parsing options; rc = [-22] 04:42:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100), &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:02 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:02 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:02 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) [ 366.767407][T12243] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:02 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 366.819920][T12243] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 366.883211][T12243] Error parsing options; rc = [-22] 04:42:02 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, 0x0, 0x0) 04:42:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 366.985540][T12365] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:02 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 367.039563][T12365] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) 04:42:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 367.088169][T12365] Error parsing options; rc = [-22] [ 367.221499][T12451] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 367.281848][T12416] cgroup: fork rejected by pids controller in /syz0 [ 367.287071][T12451] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 367.366915][T12451] Error parsing options; rc = [-22] 04:42:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:05 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:05 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, 0x0, 0x0) 04:42:05 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000006f40), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000600)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e3c463dd691d4c000000c4c442019dcc6f") setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) write$apparmor_current(r1, 0x0, 0x0) 04:42:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:05 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:05 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, 0x0, 0x0) 04:42:05 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:06 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:08 executing program 2: 04:42:08 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 04:42:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:08 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:08 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:08 executing program 2: 04:42:08 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 373.151998][T12849] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 373.228442][T12849] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 373.257396][T12849] Error parsing options; rc = [-22] 04:42:09 executing program 2: 04:42:09 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:09 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 04:42:09 executing program 2: 04:42:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:11 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:11 executing program 2: 04:42:11 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 04:42:11 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)=' ', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:12 executing program 2: 04:42:12 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:12 executing program 2: 04:42:12 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c12") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:12 executing program 4: 04:42:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:15 executing program 2: 04:42:15 executing program 4: 04:42:15 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c12") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(0xffffffffffffffff, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:15 executing program 4: 04:42:15 executing program 2: 04:42:15 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c12") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(0xffffffffffffffff, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:15 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500080004000c00080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 04:42:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:16 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x4000000) 04:42:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:16 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319b") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:16 executing program 4: madvise(&(0x7f0000bde000/0x3000)=nil, 0x3000, 0x10) madvise(&(0x7f0000bdf000/0x2000)=nil, 0x2000, 0x11) 04:42:16 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(0xffffffffffffffff, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001a40)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000300)=0x1) fchdir(r0) r4 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) r5 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$TIOCCONS(r3, 0x541d) write$P9_RREAD(r4, &(0x7f0000000400)={0x6b, 0x75, 0x2, {0x60, "e9667d65872e5c70319e077bf6969437a260fe155c0229fc60c36767a84e7fa2e63352556570470d912726cb6f26cccc07133f5076afb74d55da442c23a2bbe6c040c846158e8ff50a608a183aa5cb09e0d6c51f79d1020900c00cb7ba2b1749"}}, 0x6b) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) syz_open_procfs(r6, &(0x7f0000000380)='net/ptype\x00') ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RWALK(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="570000006f020046000001000000220700000000000008029615c5747ba79cf02846e4a800000100000a00000000040200000006000000000000000d0400000003000000000000000800000000070000000000000002030000000200000000000000"], 0x62) write$P9_RFLUSH(r5, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000800)="2ede48ef33de0094a900"/22) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 04:42:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:17 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319b") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:17 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x3ce, &(0x7f00000001c0)={&(0x7f0000000040)={0x20, 0x0, 0x4, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x93}}, 0x0) 04:42:17 executing program 2: clone(0x3fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x2008007800, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20024, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) [ 381.558420][ T26] audit: type=1400 audit(1555476137.280:52): avc: denied { create } for pid=13584 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 381.640867][ T26] audit: type=1400 audit(1555476137.320:53): avc: denied { write } for pid=13584 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:42:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:18 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319b") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:18 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 04:42:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 04:42:18 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) accept(r1, &(0x7f00000012c0)=@sco, 0x0) 04:42:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:18 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd0") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:19 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 04:42:19 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd0") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x8001004000000016) 04:42:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:20 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, &(0x7f0000000080)={0xcbf}, 0x8) 04:42:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, 0x0, 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:20 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd0") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000380)=0xffffffffffffffff) 04:42:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @multicast1}, {0x0, @dev}, 0x18, {0x2, 0x0, @broadcast}, 'veth1_to_bond\x00'}) [ 385.039295][T13756] Error parsing options; rc = [-22] 04:42:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:20 executing program 5: open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, 0x0, 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:20 executing program 2: [ 385.214951][T13774] Error parsing options; rc = [-22] 04:42:21 executing program 5: open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x8001004000000016) 04:42:23 executing program 2: 04:42:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, 0x0, 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:23 executing program 5: open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:23 executing program 4: 04:42:23 executing program 4: 04:42:23 executing program 2: [ 388.183570][T13893] Error parsing options; rc = [-22] 04:42:24 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(0x0, &(0x7f0000887ff8)='./file1\x00') 04:42:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:24 executing program 2: 04:42:24 executing program 4: 04:42:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x8001004000000016) 04:42:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(0x0) 04:42:26 executing program 4: 04:42:26 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(0x0, &(0x7f0000887ff8)='./file1\x00') 04:42:26 executing program 2: 04:42:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:27 executing program 4: [ 391.325716][T14026] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:27 executing program 2: 04:42:27 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(0x0, &(0x7f0000887ff8)='./file1\x00') [ 391.376105][T14026] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 391.432743][T14026] Error parsing options; rc = [-22] 04:42:27 executing program 2: 04:42:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@loopback, @initdev, @ipv4={[], [], @initdev}}) 04:42:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x8001004000000016) 04:42:30 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', 0x0) 04:42:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(0x0) 04:42:30 executing program 2: syz_execute_func(&(0x7f0000000440)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") setpriority(0x0, 0x0, 0xffffffffffffff4e) 04:42:30 executing program 4: clone(0x800000000200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xfe56) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) 04:42:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 394.500460][T14255] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:30 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', 0x0) 04:42:30 executing program 2: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000100)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) accept$inet(r2, 0x0, 0x0) [ 394.562581][T14255] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.586903][T14255] Error parsing options; rc = [-22] 04:42:30 executing program 5: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', 0x0) 04:42:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) clone(0x102102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKSECDISCARD(r1, 0x127d, 0x0) 04:42:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(0x0) 04:42:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 394.943689][T14531] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 394.996986][T14531] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 395.085184][T14531] Error parsing options; rc = [-22] 04:42:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x8001004000000016) 04:42:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:32 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 396.811076][T14716] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 396.820957][T14717] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 396.836619][T14717] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 396.876239][T14716] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000094) syz_emit_ethernet(0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa09000000aa0086dd601bfc97002b8800fe80000000005edeac3dfbba4100000000000000000000ff02000000000000000000000000000100004e20002b9078e29607149378d33e1db1c73936c77aa3f7fa682a042bd36823686253665a70e889ff71f611aaf0b826c7359ec7b951a83fb3d62bcfbf54ef8ab9216fba58d80c9547e08f96216922914031d5537816a04a76f4dbc45ea9469a85d2b4d703294480612a9f3457623ba61c35118f7483158ad0ca2f9ef1f323932a566304052b2fb43b66d87cb709c91fd429b89bddbb35701f943e26f9"], 0x0) [ 396.924539][T14717] Error parsing options; rc = [-22] [ 396.943842][T14716] Error parsing options; rc = [-22] [ 396.979355][T14820] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000094) syz_emit_ethernet(0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa09000000aa0086dd601bfc97002b8800fe80000000005edeac3dfbba4100000000000000000000ff02000000000000000000000000000100004e20002b9078e29607149378d33e1db1c73936c77aa3f7fa682a042bd36823686253665a70e889ff71f611aaf0b826c7359ec7b951a83fb3d62bcfbf54ef8ab9216fba58d80c9547e08f96216922914031d5537816a04a76f4dbc45ea9469a85d2b4d703294480612a9f3457623ba61c35118f7483158ad0ca2f9ef1f323932a566304052b2fb43b66d87cb709c91fd429b89bddbb35701f943e26f9"], 0x0) [ 397.021126][T14820] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 397.052021][T14820] Error parsing options; rc = [-22] [ 397.154956][T14871] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 397.226176][T14871] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 397.274970][T14871] Error parsing options; rc = [-22] 04:42:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 397.320239][T14948] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 397.384817][T14948] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 397.437180][T14948] Error parsing options; rc = [-22] 04:42:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x8001004000000016) 04:42:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000094) syz_emit_ethernet(0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa09000000aa0086dd601bfc97002b8800fe80000000005edeac3dfbba4100000000000000000000ff02000000000000000000000000000100004e20002b9078e29607149378d33e1db1c73936c77aa3f7fa682a042bd36823686253665a70e889ff71f611aaf0b826c7359ec7b951a83fb3d62bcfbf54ef8ab9216fba58d80c9547e08f96216922914031d5537816a04a76f4dbc45ea9469a85d2b4d703294480612a9f3457623ba61c35118f7483158ad0ca2f9ef1f323932a566304052b2fb43b66d87cb709c91fd429b89bddbb35701f943e26f9"], 0x0) 04:42:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x1000000000000094) syz_emit_ethernet(0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa09000000aa0086dd601bfc97002b8800fe80000000005edeac3dfbba4100000000000000000000ff02000000000000000000000000000100004e20002b9078e29607149378d33e1db1c73936c77aa3f7fa682a042bd36823686253665a70e889ff71f611aaf0b826c7359ec7b951a83fb3d62bcfbf54ef8ab9216fba58d80c9547e08f96216922914031d5537816a04a76f4dbc45ea9469a85d2b4d703294480612a9f3457623ba61c35118f7483158ad0ca2f9ef1f323932a566304052b2fb43b66d87cb709c91fd429b89bddbb35701f943e26f9"], 0x0) [ 399.138146][T15167] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 399.158700][T15164] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 399.162131][T15167] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 399.211619][T15167] Error parsing options; rc = [-22] [ 399.257013][T15164] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:35 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 399.313466][T15164] Error parsing options; rc = [-22] [ 399.400342][T15330] FAULT_INJECTION: forcing a failure. [ 399.400342][T15330] name failslab, interval 1, probability 0, space 0, times 1 [ 399.431112][T15330] CPU: 0 PID: 15330 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #71 [ 399.439150][T15330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.449244][T15330] Call Trace: [ 399.452555][T15330] dump_stack+0x172/0x1f0 [ 399.456907][T15330] should_fail.cold+0xa/0x15 [ 399.461517][T15330] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 399.467356][T15330] ? ___might_sleep+0x163/0x280 [ 399.472228][T15330] __should_failslab+0x121/0x190 [ 399.477177][T15330] should_failslab+0x9/0x14 [ 399.481694][T15330] __kmalloc_track_caller+0x2d8/0x740 [ 399.487173][T15330] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 399.493422][T15330] ? fput_many+0x12c/0x1a0 [ 399.497843][T15330] ? strndup_user+0x77/0xd0 [ 399.502355][T15330] memdup_user+0x26/0xb0 [ 399.506605][T15330] strndup_user+0x77/0xd0 [ 399.510968][T15330] ksys_mount+0x3c/0x150 [ 399.515221][T15330] __x64_sys_mount+0xbe/0x150 [ 399.519914][T15330] do_syscall_64+0x103/0x610 [ 399.524529][T15330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.530429][T15330] RIP: 0033:0x458c29 [ 399.534331][T15330] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.553957][T15330] RSP: 002b:00007f7c878d2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 399.562372][T15330] RAX: ffffffffffffffda RBX: 00007f7c878d2c90 RCX: 0000000000458c29 [ 399.570367][T15330] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 399.578351][T15330] RBP: 000000000073bf00 R08: 0000000020000340 R09: 0000000000000000 [ 399.586330][T15330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c878d36d4 04:42:35 executing program 0 (fault-call:4 fault-nth:0): r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 399.594396][T15330] R13: 00000000004c4c0e R14: 00000000004d8888 R15: 0000000000000004 [ 399.676141][T15383] FAULT_INJECTION: forcing a failure. [ 399.676141][T15383] name failslab, interval 1, probability 0, space 0, times 1 [ 399.696146][T15383] CPU: 1 PID: 15383 Comm: syz-executor.0 Not tainted 5.1.0-rc5+ #71 [ 399.704173][T15383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.714326][T15383] Call Trace: [ 399.717657][T15383] dump_stack+0x172/0x1f0 [ 399.722015][T15383] should_fail.cold+0xa/0x15 [ 399.726621][T15383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 399.726662][T15383] ? ___might_sleep+0x163/0x280 [ 399.726688][T15383] __should_failslab+0x121/0x190 [ 399.726704][T15383] should_failslab+0x9/0x14 [ 399.726724][T15383] kmem_cache_alloc+0x2b2/0x6f0 [ 399.726748][T15383] getname_flags+0xd6/0x5b0 [ 399.726763][T15383] do_renameat2+0x199/0xc40 [ 399.726780][T15383] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 399.726797][T15383] ? wait_for_completion+0x440/0x440 [ 399.726813][T15383] ? user_path_create+0x50/0x50 [ 399.726833][T15383] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 399.742566][T15383] ? fput_many+0x12c/0x1a0 [ 399.742582][T15383] ? fput+0x1b/0x20 [ 399.742599][T15383] ? ksys_write+0x1f1/0x2d0 [ 399.742622][T15383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 399.801033][T15383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 399.806502][T15383] ? do_syscall_64+0x26/0x610 [ 399.811192][T15383] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.817289][T15383] ? do_syscall_64+0x26/0x610 [ 399.821977][T15383] ? lockdep_hardirqs_on+0x418/0x5d0 [ 399.827278][T15383] __x64_sys_rename+0x61/0x80 [ 399.831966][T15383] do_syscall_64+0x103/0x610 [ 399.836584][T15383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.842480][T15383] RIP: 0033:0x458c29 [ 399.846387][T15383] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.865997][T15383] RSP: 002b:00007f24d472cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 04:42:35 executing program 2 (fault-call:7 fault-nth:0): clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'yam0\x00', r2}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 399.874410][T15383] RAX: ffffffffffffffda RBX: 00007f24d472cc90 RCX: 0000000000458c29 [ 399.882389][T15383] RDX: 0000000000000000 RSI: 0000000020887ff8 RDI: 0000000020fdbff8 [ 399.890359][T15383] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 399.898343][T15383] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24d472d6d4 [ 399.906331][T15383] R13: 00000000004c5bb9 R14: 00000000004da1a8 R15: 0000000000000005 04:42:35 executing program 0 (fault-call:4 fault-nth:1): r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 400.058498][T15455] FAULT_INJECTION: forcing a failure. [ 400.058498][T15455] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 400.071742][T15455] CPU: 1 PID: 15455 Comm: syz-executor.0 Not tainted 5.1.0-rc5+ #71 [ 400.079722][T15455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.089774][T15455] Call Trace: [ 400.093079][T15455] dump_stack+0x172/0x1f0 [ 400.097885][T15455] should_fail.cold+0xa/0x15 [ 400.102503][T15455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.108328][T15455] ? __lock_acquire+0x548/0x3fb0 [ 400.113321][T15455] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 400.119575][T15455] should_fail_alloc_page+0x50/0x60 [ 400.124777][T15455] __alloc_pages_nodemask+0x1a1/0x7e0 [ 400.130174][T15455] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 400.135899][T15455] ? find_held_lock+0x35/0x130 [ 400.140681][T15455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.146542][T15455] cache_grow_begin+0x9c/0x860 [ 400.151315][T15455] ? getname_flags+0xd6/0x5b0 [ 400.156000][T15455] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.162251][T15455] kmem_cache_alloc+0x62d/0x6f0 [ 400.167122][T15455] getname_flags+0xd6/0x5b0 [ 400.171653][T15455] do_renameat2+0x199/0xc40 [ 400.176178][T15455] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 400.181735][T15455] ? wait_for_completion+0x440/0x440 [ 400.181755][T15455] ? user_path_create+0x50/0x50 [ 400.181772][T15455] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 400.181793][T15455] ? fput_many+0x12c/0x1a0 [ 400.181806][T15455] ? fput+0x1b/0x20 [ 400.181819][T15455] ? ksys_write+0x1f1/0x2d0 [ 400.181836][T15455] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.181848][T15455] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.181859][T15455] ? do_syscall_64+0x26/0x610 [ 400.181872][T15455] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.181884][T15455] ? do_syscall_64+0x26/0x610 [ 400.218763][T15503] FAULT_INJECTION: forcing a failure. [ 400.218763][T15503] name failslab, interval 1, probability 0, space 0, times 0 [ 400.221961][T15455] ? lockdep_hardirqs_on+0x418/0x5d0 [ 400.221985][T15455] __x64_sys_rename+0x61/0x80 [ 400.260043][T15455] do_syscall_64+0x103/0x610 [ 400.264644][T15455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.270534][T15455] RIP: 0033:0x458c29 [ 400.274425][T15455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.294023][T15455] RSP: 002b:00007f24d472cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 400.302436][T15455] RAX: ffffffffffffffda RBX: 00007f24d472cc90 RCX: 0000000000458c29 [ 400.310406][T15455] RDX: 0000000000000000 RSI: 0000000020887ff8 RDI: 0000000020fdbff8 [ 400.318372][T15455] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 400.326338][T15455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24d472d6d4 [ 400.334305][T15455] R13: 00000000004c5bb9 R14: 00000000004da1a8 R15: 0000000000000005 [ 400.342298][T15503] CPU: 0 PID: 15503 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #71 [ 400.350277][T15503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.350283][T15503] Call Trace: [ 400.350314][T15503] dump_stack+0x172/0x1f0 [ 400.350336][T15503] should_fail.cold+0xa/0x15 [ 400.372574][T15503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.378401][T15503] ? __sigqueue_alloc+0x173/0x4d0 [ 400.383430][T15503] ? find_held_lock+0x35/0x130 [ 400.388204][T15503] __should_failslab+0x121/0x190 [ 400.393146][T15503] should_failslab+0x9/0x14 [ 400.397672][T15503] kmem_cache_alloc+0x47/0x6f0 [ 400.402459][T15503] ? kasan_check_read+0x11/0x20 [ 400.407315][T15503] __sigqueue_alloc+0x268/0x4d0 [ 400.412172][T15503] __send_signal+0xdff/0x1590 [ 400.416869][T15503] send_signal+0x49/0xd0 [ 400.421129][T15503] do_send_sig_info+0xa3/0x130 [ 400.425908][T15503] ? __lock_task_sighand+0x320/0x320 [ 400.431205][T15503] ? skb_copy_and_csum_datagram_msg+0x3d0/0x3d0 [ 400.437541][T15503] send_sig+0x56/0x80 [ 400.441529][T15503] sk_stream_error+0xb1/0x110 [ 400.446223][T15503] tcp_sendmsg_locked+0x165f/0x34b0 [ 400.451431][T15503] ? mark_held_locks+0xf0/0xf0 [ 400.456203][T15503] ? mark_held_locks+0xa4/0xf0 [ 400.460979][T15503] ? tcp_sendpage+0x60/0x60 [ 400.465488][T15503] ? lock_sock_nested+0x9a/0x120 [ 400.470430][T15503] ? trace_hardirqs_on+0x67/0x230 [ 400.475464][T15503] ? lock_sock_nested+0x9a/0x120 [ 400.480416][T15503] ? __local_bh_enable_ip+0x15a/0x270 [ 400.485799][T15503] tcp_sendmsg+0x30/0x50 [ 400.490044][T15503] inet_sendmsg+0x147/0x5d0 [ 400.490058][T15503] ? ipip_gro_receive+0x100/0x100 [ 400.490079][T15503] sock_sendmsg+0xdd/0x130 [ 400.503988][T15503] ___sys_sendmsg+0x806/0x930 [ 400.508678][T15503] ? copy_msghdr_from_user+0x430/0x430 [ 400.514156][T15503] ? kasan_check_read+0x11/0x20 [ 400.519035][T15503] ? __fget+0x381/0x550 [ 400.523203][T15503] ? ksys_dup3+0x3e0/0x3e0 [ 400.527657][T15503] ? __fget_light+0x1a9/0x230 [ 400.532347][T15503] ? __fdget+0x1b/0x20 [ 400.536428][T15503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.536450][T15503] __sys_sendmsg+0x105/0x1d0 [ 400.536472][T15503] ? __ia32_sys_shutdown+0x80/0x80 [ 400.552382][T15503] ? fput_many+0x12c/0x1a0 [ 400.556815][T15503] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.562276][T15503] ? do_syscall_64+0x26/0x610 [ 400.562292][T15503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.562305][T15503] ? do_syscall_64+0x26/0x610 [ 400.562328][T15503] __x64_sys_sendmsg+0x78/0xb0 [ 400.582473][T15503] do_syscall_64+0x103/0x610 [ 400.587079][T15503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.587097][T15503] RIP: 0033:0x458c29 [ 400.596876][T15503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.616489][T15503] RSP: 002b:00007fdac7495c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 400.624907][T15503] RAX: ffffffffffffffda RBX: 00007fdac7495c90 RCX: 0000000000458c29 [ 400.624916][T15503] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 400.624924][T15503] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 400.624932][T15503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdac74966d4 [ 400.624948][T15503] R13: 00000000004c635c R14: 00000000004dac40 R15: 0000000000000005 04:42:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x0) 04:42:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:37 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000300)={0x3, 0x4, 0x7, 0x4}, 0x10) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f00000000c0)={0xff, 0x0, 0x3007, 0xfffffffffffff527, 0x30, 0x5, 0xffffffffffffff83, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x1000011ffd, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x100000000) setxattr$security_selinux(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)='security.selinux\x00', &(0x7f0000000580)='system_u:object_r:sound_device_t:s0\x00', 0x24, 0x1) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x34, "b1035041c35f39b3acd4f90aeae7366fe80aec95a18961042417aef0805875966bc8900183f6dee582da0a80a20acba2e68ea4f8"}, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000100)=""/110) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f00000002c0)=0x1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x6012, r1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000340)={0x0, r0, 0x0, 0x80, 0x4, 0x1}) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfff, 0x400) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={0x0, 0xffffffff7fffffff}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7fffffff) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000140)={{0x1000, 0x0, 0x0, 0x7, 0x5, 0x2, 0x4, 0x2f26, 0x8000800000000, 0x3, 0x1000, 0x5}, {0x6000, 0xf002, 0xf, 0x7, 0x4, 0x401, 0x1, 0x4, 0xffffffffffffff00, 0x9, 0x0, 0x80}, {0x15000, 0x0, 0xb, 0xffffffff7fffffff, 0x5, 0x4, 0x3a4, 0x8, 0x0, 0x3, 0x80000000, 0x6}, {0xd000, 0x5000, 0x0, 0x6, 0x80, 0x7, 0x1ff, 0x7fff, 0x3, 0x0, 0x3ff, 0x9}, {0x5000, 0x5000, 0xb, 0xbdd, 0xff, 0x3, 0x8000, 0x1, 0xfff, 0xd858, 0xe391e41, 0x62}, {0x10001, 0x1, 0xd, 0x0, 0x0, 0xfffffffffffffffa, 0x8, 0x80, 0x1, 0x9c0, 0x7fffffff, 0x1}, {0x4000, 0x4004, 0x0, 0x8, 0x5, 0xffff, 0x6, 0xdd5, 0x3, 0x8, 0x7, 0xffffffe000000000}, {0x10000, 0x1f000, 0xf, 0x0, 0xffff, 0x6, 0x3f, 0x7, 0x7, 0x7ff, 0x100000001, 0x2000000000000000}, {0x6004, 0x6000}, {0x6000, 0x10002}, 0x80000000, 0x0, 0xf000, 0x2, 0x5, 0x0, 0x3000, [0x100, 0x5, 0x10001, 0xa9c0]}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000003c0), 0x4) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000040)={0x6, 0x1, 0xffff, 0x1, 0x8000}, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x41, 0x0) 04:42:37 executing program 0 (fault-call:4 fault-nth:2): r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:37 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 402.064582][T15518] FAULT_INJECTION: forcing a failure. [ 402.064582][T15518] name failslab, interval 1, probability 0, space 0, times 0 [ 402.078954][T15517] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 402.100693][T15517] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.117988][T15518] CPU: 0 PID: 15518 Comm: syz-executor.0 Not tainted 5.1.0-rc5+ #71 [ 402.125985][T15518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.136046][T15518] Call Trace: [ 402.136078][T15518] dump_stack+0x172/0x1f0 [ 402.136115][T15518] should_fail.cold+0xa/0x15 [ 402.148312][T15518] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.154132][T15518] ? ___might_sleep+0x163/0x280 [ 402.158998][T15518] __should_failslab+0x121/0x190 [ 402.163942][T15518] should_failslab+0x9/0x14 [ 402.163961][T15518] kmem_cache_alloc+0x2b2/0x6f0 [ 402.163980][T15518] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.164002][T15518] ? strncpy_from_user+0x2a8/0x380 [ 402.184666][T15518] getname_flags+0xd6/0x5b0 [ 402.189183][T15518] do_renameat2+0x1f3/0xc40 [ 402.193703][T15518] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 402.199258][T15518] ? wait_for_completion+0x440/0x440 [ 402.199279][T15518] ? user_path_create+0x50/0x50 [ 402.199295][T15518] ? fput_many+0x12c/0x1a0 [ 402.199313][T15518] ? fput+0x1b/0x20 [ 402.213825][T15518] ? ksys_write+0x1f1/0x2d0 [ 402.213850][T15518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.213865][T15518] ? do_syscall_64+0x26/0x610 [ 402.213887][T15518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.218596][T15529] IPVS: ftp: loaded support on port[0] = 21 [ 402.222171][T15518] ? do_syscall_64+0x26/0x610 [ 402.222190][T15518] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.222210][T15518] __x64_sys_rename+0x61/0x80 [ 402.222232][T15518] do_syscall_64+0x103/0x610 [ 402.238402][T15518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.238416][T15518] RIP: 0033:0x458c29 [ 402.238432][T15518] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.238441][T15518] RSP: 002b:00007f24d472cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 402.238456][T15518] RAX: ffffffffffffffda RBX: 00007f24d472cc90 RCX: 0000000000458c29 [ 402.238465][T15518] RDX: 0000000000000000 RSI: 0000000020887ff8 RDI: 0000000020fdbff8 [ 402.238473][T15518] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 402.238481][T15518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24d472d6d4 [ 402.238497][T15518] R13: 00000000004c5bb9 R14: 00000000004da1a8 R15: 0000000000000005 [ 402.267072][T15517] Error parsing options; rc = [-22] 04:42:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') sendmmsg(r0, &(0x7f0000004500)=[{{&(0x7f0000000d00)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @empty}, 0x0, 0x4, 0x3, 0x3}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)="1af2e569e88c97249985cd74e2ff11292ed0bfb7913ac1b3d054f008be918366097207833000a777107cc84d63fd5cf5b294c0ee4f8ef7ca64f805242139cef8acb7aeb596efdd436a549be961c3b1a379e0348577bd0317d749c30205351a4e2c192e89bed0eae5609e3431ed1b13647858c1fc657c2ec30f495febe7140785349bfd420ba9a7dd506dcc639ce942cfb83c44f631eff86f689bf8200bbdbba40eeba20260e844720ad5d905a0cbeb0fecfe7a0705512fdc14845db8b5ca9bb4e72864ca830c555bcf75aa70215edffa678de2c0f35a6a4a6e43f71ce9cb7ad6e6e393fe72", 0xe5}, {&(0x7f0000000e80)="143a2363e758fc0f830d97f5b7401fe3302ceac81b0a5f72dad838b4e485144e7cfb7775019053063499515a4692e782c4b0c2ee32be2a112cacd00f5f605e70c057c55b7dae95757bb7168fa49f2211d1593cc8603c56be78f8024f5a9f2af71ad959b600dda2a3303a8263e2e2225752cd145db7676e8a92fb6ecc5d1bae393ba42060378b7a867766a8cd", 0x8c}, {&(0x7f0000000600)="ab28a06994b0aa68361ee354b62822059ddc37f4a0b9fa46e911127468de9efbff7d8b39e47c7b6fed3b8fef0f23e92c6dc2d12207f0078768778b75e2", 0x3d}, {&(0x7f0000000f40)="fffc915f589d1b6176c5ca04a7ee52a3a4809ec2c9a5dfeee44c9337655fa07a7c136bdd95edfefada345a4eecf1cb385bf475146a957ece3e8250da427df5c2efe833638014a195abbe63cfee0f1cb46c32ae4b4ed096b0307b066328d90b7a64f23d97ff52480adceceeecd91f5ca751c704", 0x73}, {&(0x7f0000000fc0)="7ab87b1f9a7fd0fe52051d1669fd9476ab3ba437a64e3b048f8f179e662bb9bc36e4a657439d67d594c34e7b9fec49cfecc2bd9615a36af07a06bbdd1f41f75cc9919c5b51b300071ecf7f8e2cacdff2baf183f97ee9d8cd573a4e28f0edcc920c", 0x61}], 0x5, &(0x7f00000010c0)=[{0xd0, 0x13f, 0x16ec, "c70b58bbe2665419749aa82e1fe8cd701567cc260003b786d4273c0b55b481a61534b343bcd49e30c24d73b080dace87c669231c15b3eddf8aaaddad64227f49d5420f077dcbeadfce797f30cdb31778507fdce93aa1f6ed961f275023dc2924533b2ac267cdc4c139044c00b181aa396bd5403ff8c9f0906701186b4b9758dfd1e6352f674ad99caeb95d3243726aceafdf338aa71594be20d941db519f5eb398f1a133df195739cce4ec73bbbfb1ce9c057c2472c043882f47c41ca9bf7f"}, {0x28, 0x108, 0xfffffffffffffff9, "edd923f2f656e86fe9fdd7fccb6ba00e74b587dabe"}, {0x1010, 0x117, 0x40, "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"}], 0x1108}, 0x2}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000002200)="538b4b78fcdb3acf9d6c58f664158602cf47f8db98d76cc0b1c3b99c60a1cd876036f195b02fc861d30db7af8fb3e509a604c6a3c1a8e10779aca3052091075a76ced13c505f7ae047eb08edf93b95f496ec290bbd97f2b3", 0x58}, {&(0x7f0000002280)="e29a124aa8705db567241ed8a11432", 0xf}], 0x2, &(0x7f0000002300)=[{0x1010, 0x11f, 0x3, "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"}, {0x78, 0x117, 0x6f9a, "d8cf02e42008b818f40b33104c172e15e8feabc543fddc31edd07d455d7b0f921ca0ae11dd6164d8d7b00f88f82c36685c59272b0b726e527ff6744be4e360ad7908106b232da0ddf1439f3ff4d9b7c4f896f9af0231852623566749c4dcdd798a4825e2ff10"}, {0x28, 0x1, 0x10000, "0721734308003cfc7352cff1721d33dc3644f4ba5f442cd3"}], 0x10b0}, 0xe000000000000000}, {{&(0x7f00000033c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @multicast2}}, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003440)="e9673f76135f661b56d9aa663408d1722b6fc583ec985f92c41baa4f8f4796bb29a97ad75b8d2c960742c1eda6ebb9dc14d7fd87d8b35f90ac84ce0fdd10fb99844f7ee81514a5f532859867efc6a8ee3407fb7079dd59d1c7f252cdd32571f895b2483501f7dbf47735913a1c5a440972d3b844ec048fdcba594b312cdd60d2b012a2f2385710e7ca3c79e2a629a728f718cf3ec923d2dc89e55ff3d1bc37910e69d7e3550d2fc64990244882c2973db99018615cb0cd2c4d102fa022480bdce69edd53bc64fc41254ff482a3289a5c7288", 0xd2}, {&(0x7f0000003540)="d0ce789e8eaa6805b0486d46b1f9750ac60ae8b1328bbc3ca290a405c21b28f8541aa1a972d13818ea9b777f7e162c57856a5ff5caedf1a3b92309dc073cf50382e55bf6600477a3d068f4d43fb5bbf69bfa533a79f7eadd9bd7a65f95ce7832a3f7e6562ad86b75bc86af6f6284997469ff715b280b088f25e428a9f22c5cdd5cb3f2739a8e62", 0x87}, {&(0x7f0000003600)="2a99135c931cb645736c6c096cfcc368de41671aefa656738d643943b304a80cc3afe14ae54906fda89142745249c131baf4aad217d0b7790c24588e6bcb48bbaf1935d4c0465c41bd290ad0faf4347302279dac3dbb251014e752483d3d8ef5a789d0be2e4a5b5c936f4bec618df2c6503961ae70705d130e1e87b3cc59533723549fbf5b81e0f8f98411fdfde7fc2493522a12a7ef12d7760bded269ae7f42d098de79e0208e4ecaa4daf7f75b6f51e53c5c5c8fb69faa4c5f", 0xba}, {&(0x7f00000036c0)="b0ab7f360f1379860e0ba3599eff604174172238e5465ce9982ce0ee0e99bd24be68945313796cfbe761ddba1695740af1b614a05fbf8b484839c3460207fea58b5df8cd8fe8693fbb437809cb1d01c26b3abde69a5f96492c7c480a8e16bc98b3937e9187bc3e757cd2ec7acf2626e99ebe85209bac692299a897a92d60515162455bb50a7393e82c75acac91bcbf7e317337efb614a54e9ea02d09af7bd7a420662c09b56fd2ad3597198749788c64978198687b4115aa33da3716edbb7c193eeec47763dc54e7c88044dd4b976a5af5017b2f3c24dd887f53bc", 0xdb}, {&(0x7f00000037c0)="04ceb91f8d32fc290e68b51ed920063027552b45bdfb60b140d690eeba9cdad47a1940674b37841aaf19f4b2e0d09c5387bf034a07f1bf02390157dd8342e8486866f1bc8569e9dfbc66afa31491219956f9c64f0d99152fa164500203862de7cd8cf48c2e931f75ece3cdb398b810f0f9a25eaf67d4d5ccde6dc1a19f6f69d095a493d32f92254f1b8de426cf8383860099348b3ade275634711874b843a5a8919ba6256df4832045de8b981af2d23868e077466d04a836cf7045df6820461f1f29c9ec9ed00313a8c204e4139975b9e8d46788446e71cf5e7904a8257ec08d2c900da4", 0xe4}], 0x5, &(0x7f0000003940)=[{0x80, 0x11b, 0x2000000, "a9b92136f4259e418d6835d90335a3b1b0946411e523e4c111e68cafdef8022d21b5cfa967c98dc533c0724f6d64e421ed47cc1fe08a31ec812ae7c735080c06b88599328a207607c1ff584f1fe0123a6e5c907e5dbae14fd60853e5464f62164fd794fb86ab7986192070f303057909"}, {0xf0, 0x113, 0x73f4, "29fc45726bef7b05a2827800f7bd2ccba94ddee676e84f53ed7865fa3e6fca1109bcb50c14d88238b4bac515dd1d41aabe02c8de4d5793511cd2f52ecfd819b28252bac5ccb40f688e174fde1df9d0def43e6f14fded11768bb4bde9343d48e28a6486d238309a5cd43e4ceea2af32519c67e61acc2ab044db4cf023f5a4e776cb4f92c5e1f4b2e8c00748d9b029aab36f0b3626b32db51e209a4bee1e25f45835a9daa166a90a5f84c312cac0626453ff5e2f37d725a2579c61a74d7c39ffb405e57c896988e2ca136469036ee563e173f6d17d1c61ee1a53a0bbe40c96c2"}, {0x20, 0x0, 0x10000, "9ed1b5ec57b3ff6ef0494c01a2"}, {0x60, 0x3a, 0x3ff, "36048057b865a0b0ad3ba77bdb3e1f90477df6859f94f95563499c4a45ebcff454cfa5782150abcafca7e287d73003c5411ff6f495e9e857cf563677733b710d0f62f37cf9f7a21ed57b"}, {0x108, 0x10c, 0xfffffffffffffffe, "3641b007ee0df3723ca3a543eacacb7e382c532c5304d3ed755e9318f8884c2740fb0ed07228b0cb8627a1c541225f215d4f0534c99d36831cf0bc87480139917458223aabe9928b2ab6793bceeafc2563ff036b353e451d212148aba47952cc6368d7ab40794a38bb87a39da9a6831c5b4587250d096590c1a92bc3d32fb0417b43e7325cd0f22abce49f8b9e525513b9952e241ae699f84dc69223cdbb6691ec9e1f855e65cb4fb62d90a519f6696cf101fd121a6ebdfb2c50387dd1a03843978d32d7226fb0e44b2648cd172910bf0b011662a1eb6a26fe0962b16024d6db32faa104fac7cd2793191519b3f27b40626f"}, {0xf0, 0x11b, 0x7, "828cbbea42eb7ddc8097cea2ec82ec3e5f484374af41a7c51bd99cc01a891b2c391eb8f79d26919b1d16dca92b6ba8f17ac100e10610ecedb3d36ece4e05ef1cd4747bf4537ed40ce24fb8d5d7b5893c576ac8a8c3373f347cc786ca9acb7628e06088d921e937a97d21cf81a7f480dc3ed6270bb057795b72cbe7a0a1a26fc759eb5f684c697ccaf58031df546e0cb786177049c31d975c07846235f20a52b8537175ae04834d490f3ecfa12867f9cdd81aeb55fe69dfe7c3b9caaee56567cabb4e06ce984e7a4c1a22c3e1a9daa206b36a4ba70090a1bd8650"}, {0xd8, 0x10b, 0xd4, "e623f864967f088d730d32ce2cb3e9d1cc57f0527bcc958463621a5655b70bb417903f5e72a9c3eb7fae0e93e72c6c987d92f8b8bfb75fea6a7872ddf44299d7f8ddf20a07a99114ea2f944d89c983f3450818724e1aa1ea4b619c8663a957b15c466361ee447cddb0f96c15cc169acaceda8cb289f6c8562599ccdd49a00958cb264d27ee042a6fdeb541f35f98b42c4d3c3c7c6a962e15c0ec09286617221980caa10b3e510f4266e391277b48af6d80321900789d219cdcb70df1178cc96bfec880ee92af"}, {0x88, 0x0, 0x8, "b170b88b8e2d60f0e9d30c731fa57e532ca9a95932fc745251820e0e4ed7a94b55bd5c84b1aae46c0c6caed1b7f5e58e8f33ed72afb00c0879a842b78419fdf98fea0009925ce3469ab041c99960185208562bbcbba131fa26297c5983c247b808c731fffd599ff9fc69514e46d67eb99f70a002a9"}, {0xb0, 0x0, 0x7, "ff43b03a9ac95c3005b2f3c64b536b29bcc424f740d0e599e234b703ff5317c7c619c8a02370dedaa3bfaa938b7bf8d1b7588547ab5b24802be24b4363f91420be4f4b00904127c4ae1eb48b0aee5fac5636dbbee959525813c299bdb167ca29481d32066e7e757a0ca0153183b805a26f9b2e428d1569b94e75d626180f77bac04f00ab324448755c49e42556b99d3d53f65ee81935ad5eaf08e46aaf"}, {0x30, 0x0, 0x4, "25199c15f5c04a67f9ae40f6b5d1875105e28a39db192434e9283ea9"}], 0x628}, 0x7fff}, {{0x0, 0x0, &(0x7f0000004100)=[{&(0x7f0000003f80)="29fac7017cdc33104761fe0bad937d19e484b616bbe83dee75865016608ef437a78a90df0783134b22c03b48d39e7004b9917e7f4a402d2752cd7727800de687e6e7fec529d333fe5fdc38922601f91a801e138d907be7924bb22f6697191e55a9ced37b3058e082e3889d8e3f59a11e62253d4fd61840641adbe0154dc4b541ed56ba964828f39a48d055c309e31f5878282f497ce4", 0x96}, {&(0x7f0000004040)="6cfafd0dfa5938cb7380f97a7969cf6cbaf7ea510e9e99841c3c3a6a08ce3f9e5f81a49a70f3f55818c3181b27f85a334c9fcc2799664a1835f27f449a2496a0448cc4c8d173d8b16069caae7647105b7729df7cd95271e3415ead77e7eb88caa20426159327164c75f2a9a774a87e87a52b942deb08160ffe7078723568c23ea752e7dfb9069dbe62d8e2c065426febe9d9a2996e9c430f51d6e59d6407c5f6062d47b5817027f9", 0xa8}], 0x2, &(0x7f0000004140)=[{0xb8, 0x106, 0x400, "e3e08daf2adcc65a4222d24367ca927a98711ce3bc38a3347dad56901373a117f087dc426257dedc83819af890a8e8f4e1dedcbf771ae90125b888cdcf6638dfec9a6ad0e2f14fcb4e83498a55378a8135ec5440bdb4bcf68aa1b2010d4d7100928d499a9eea48a91079a17edc89976a3b75c2821664f2c0c942cde8fe69071617680f19ab681f1fe26b53573188c6f66e6ccd3e2ef477eeb30626817a393e01fa"}], 0xb8}, 0x2}, {{&(0x7f0000004200)=@l2={0x1f, 0xdc29, {0x100000001, 0x1, 0xffffffff, 0x48a, 0x3, 0x7}, 0x1, 0x2}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004280)="4fe46f90", 0x4}, {&(0x7f00000042c0)="82678988ffce63e4d696f250478bb725b50ca8803f0960dab6594f3848cc34432ca9efbe5de9bd3059ee6568e55d6ae33b2428594ed066c180ae1630af2d0521abae2984940de4844b1a2ca8d08f5f56ae799f17cc5539689561797260281ded9e6cb7784c3995b3564d1fddb1c43d04e0512c03e1a94b836fb7a995c27dd0284f006e25f038cc1f62f740d40dbda17a20ced0479fb9fa20fbecbca78b4bdbc27b7ecea0df8f919d3f565ed0adb0370c46b1ef74a67437778a01ee26b8e8b1148a9de4e9b1", 0xc5}, {&(0x7f00000043c0)="b304b282f3f7163aec61768153694daf981673518d4794be439bb4c3bcb24b4023fbb79425e0194d35ec3c93b116a920cdbddb46e23a6a86220b5aaeb27808c667b6b04e393ff9cfd6dedfb3677ba7b556b9d750fdbf73a3ad7fafaca7559c88f003ce41e2f040dcc2b34f1a538ad4c54769edd5e15792d2a679cb7a402e896d5e3f11ee136f934791969803272d7c81c85b6b028e6df3671ca480cc5e81d7a9908f009a7f135fd0ca76cb8d691cfc5a1ef730006b61ee1aca3b944ed624101515ea4f1bb1a63908cc847d1c7b804b3fc17ae7c7b0501ff958fc51", 0xdb}], 0x3}, 0x5}], 0x5, 0x4000800) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmmsg(r0, &(0x7f0000000c80)=[{{&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x2, @link_local, 'bcsh0\x00'}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)="2dec74b91534f1aa7f01e937b20867c16f4deb0379eb1bfa7f4f6c5d81e2ebf609bfb55ce8aa450fe56b28d3ac737a4d75b64081bf2da18e6271b6110743ae5afd653a9455ca1bfaff36d55d0a4427e93e430784a244a8c5f88ad21bec55c75b5230bd99859f5188a3110b55180a52d56ff25bc6805f79e5a3353843bbba40737a9fee4c2f6f719efa52c61191417ba2b1", 0x91}], 0x1, &(0x7f0000000440)=[{0x48, 0x107, 0x8, "f665fe616e8e2af28282c117565823834c14ec3dfd48d6da335e42d181c32b5550ac246b26bc72880ae387df93d82da5afe7f2a9b1ed"}, {0xe0, 0x11d, 0x1ff, "665210b0f90df01d6a62ad111f46bcd663c26c0e601074a3db4723fd38668974e056acb3fb2e2689ae917d3091e799e3045e1488e15f425a392d624618e44c4d3b6e54c5c6cdc60e3b7d64095dc8286b34289ceed6897592c7587dae221ca9c0fad8d637b57b3e0d55ffa5de18001dd858b4a55e2c295facc51fc94a582ed7428df96c3b603d6d7af66102e65a789a2d734ed8ca23ad07ccc99598312145ed5d40b6a0634f9f8342dc75c9628ed579692a3152ebd8507894fa737c49a5fd40d724e59d4d532efe44da0aadc85f56fa0d"}, {0x88, 0x106, 0x4, "e067b58a42f31fa7800093566ee7f7a6976515dce9ccb43f1eb44d9c37025ff7f2c93e60657be7fdd852a42845c632714eb66deddf64283e2a93810f5d617ce4497ef6c49d51f96ea205411d8d78c8457a39970f833336647f89df97faa073a5b7e25ff4553fc5b54f2d87fe36bcdd6e869885e22fef"}], 0x1b0}, 0x7}, {{&(0x7f0000000240)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000002c0)="17aef7b0c798", 0x6}, {&(0x7f0000000680)="14cc56da54879fa692cd7c980cbee5267e7fcdd96f46ec91926ee99709ab2a49e47827310bc77bc24506e58736e08dd9d87844eddc6337508a5bf91ed908192f9f7509137e96fb2ddf00e442f1b1103953e3b877bc8c3ab3fd80fc6de6d7874ef104b8a332e340485bc62a45134cb9d060c65f", 0x73}, {&(0x7f0000000700)="86b8a7a7a9d3bf30dfbd0508e5c9b5d7a7e609737f2066a3c88eb2a2b2e70ae0b5ca36fb23b0bcaf9f624894a072947aef0ef409397f3b196fb8195711a8451b6c4f4ef35331ac164227b4baa0689592e2029a9ad048d66483ee0f3cf49bcae6bb7aaaefa8ed8a6c66768e79a14b67c9519e072d44041c9b91519104f319f89a564882ffb4d69d5e7d5fda6c4289a5251f6ada1a0510d70cf6a7bb37c98f41ddfb80fc3e8078c7324893b7fbb05ec0082af1", 0xb2}, {&(0x7f00000007c0)="caf64c05647646bf40155815b7309acbab55fceec8573d82a1b605ce6c78264acfa84e9be1881d232c2f2857f505b63799bd30bf6639f9c1d178da659267a3de289746844d6ebb4e11d20925cd42c7028b8380c7af3263adbaeebddff9077f71cc81c6fca8539e39070ea235e89ca9d7cec0e9e6a4047b0541bc8349dffb88e7fc0135439ad6c4dd4570d45114f491568dae395e4ac2c71f70fe3f298e59cf29dfff5fc632022b9a081d20d5d622411ad0db2cd26ae6b6d359b0a7cf882fe90e5d3a26a369d5856b6a89c72fcd85050597a844e057840353a987e57aba71c0294858adbcdfdcbfb5c07f6ac2716348bd0b51f59a6e6f01", 0xf7}, {&(0x7f0000000300)="51602eb661bd09575e2de8075db392beb55e69b7a5f62451f582c241e4cd57c6f88704bb0d2a38", 0x27}, {&(0x7f00000008c0)="adf8c19ceaebbc1c7d6428eee22273c2afaddff777b3cecee9c2824e4458a2563ee607d33017656bf801513ae8d4c18f68c595ec5ad94dcb6bd4274f386b105a9f287650891d250d6a55009e4bd59af59c1e5db1b89e0acf15e881ecc880d1233a88bcf3c2cdf6374760f7f6ced48984359e8f68", 0x74}, {&(0x7f0000000940)="1dadda1ed769d9670abe11223c422384f8d03502a2e90fde1dcc3be8f54fe0c506de4aa1628073a4bb850d989dde3965710683539aca0cda89ecfd76f800e579d523d6be8440b018fdfaae95ab98c5f335c8aec4f2d65e9ad470997d274b53626c5c0c3391936fd5e4aaaa639c7ce9e2cc0b1e5f4f4875bed5bb62a8a81a5c10536696fca912bfe34714c635fec5f21c41090370e4c79689aa4f193a4a420f0b26f7986a39c5ef181b7de6776e3955af4f", 0xb1}, {&(0x7f0000000a00)="fa1577a0360e3a9665933941575b9ff81b3134da2506af85d602b2ee05fc069fd2a53559d8b1dcaa17078eec9285919fd04699707b7eb94289e0e1f5ffd5cb201baaf9", 0x43}, {&(0x7f0000000a80)="344a8d6b9c33899fea3e208d1458d6f2f0eda03a1a4e7e5f75dda95aeaa0163c21bedc2a00037dff50a7cf24af0c87716a75ef04f215ada388216f22695a48c00013d9596182456d8f6b4f9b00507460b0dbbc69d5378ecab52d4b327a", 0x5d}, {&(0x7f0000000b00)="c2ce06aad8ee828e97d8a4f13624cdd69c3486446b28398e9e26046cc0423fca607ebc4d23b96afcf42cbd896e1927aa41ce1332e18bded86b9c935257a03acb1819de85ab6cd7b2ca2db83c755369870ecffbcaacd27d8a3f56758bba8a868a7e977a958bb6dd052de64d5174a4893e6bed29244897ab0e00951d6d26b79c67eb7cdc9cfb3af2c00a30d8def0a907d172799503c4ab6af6ae7f82f2ba5b1f295db1ba3dafafdfc2571965744d4f7e1e64077ba5d1082b8af02427f44fa4c1", 0xbf}], 0xa}, 0x7}], 0x2, 0x10) [ 402.392404][T15527] IPVS: ftp: loaded support on port[0] = 21 04:42:38 executing program 0 (fault-call:4 fault-nth:3): r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 402.469256][T15640] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 402.492556][T15640] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.543893][T15640] Error parsing options; rc = [-22] [ 402.604904][T15672] FAULT_INJECTION: forcing a failure. [ 402.604904][T15672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 402.618134][T15672] CPU: 1 PID: 15672 Comm: syz-executor.0 Not tainted 5.1.0-rc5+ #71 [ 402.618147][T15672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.618172][T15672] Call Trace: [ 402.618205][T15672] dump_stack+0x172/0x1f0 [ 402.618233][T15672] should_fail.cold+0xa/0x15 [ 402.618255][T15672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.618271][T15672] ? __lock_acquire+0x548/0x3fb0 [ 402.618299][T15672] should_fail_alloc_page+0x50/0x60 [ 402.618317][T15672] __alloc_pages_nodemask+0x1a1/0x7e0 [ 402.618338][T15672] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 402.618350][T15672] ? find_held_lock+0x35/0x130 [ 402.618376][T15672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.618404][T15672] cache_grow_begin+0x9c/0x860 [ 402.618423][T15672] ? getname_flags+0xd6/0x5b0 [ 402.618443][T15672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 04:42:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:38 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x2, &(0x7f00000003c0)={0x0}}, 0x0) [ 402.618475][T15672] kmem_cache_alloc+0x62d/0x6f0 [ 402.618504][T15672] getname_flags+0xd6/0x5b0 [ 402.618522][T15672] do_renameat2+0x1f3/0xc40 [ 402.618539][T15672] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 402.618559][T15672] ? wait_for_completion+0x440/0x440 [ 402.618575][T15672] ? user_path_create+0x50/0x50 [ 402.618592][T15672] ? fput_many+0x12c/0x1a0 [ 402.618608][T15672] ? fput+0x1b/0x20 [ 402.670224][T15672] ? ksys_write+0x1f1/0x2d0 [ 402.670248][T15672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.670269][T15672] ? do_syscall_64+0x26/0x610 [ 402.680741][T15672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.680755][T15672] ? do_syscall_64+0x26/0x610 [ 402.680773][T15672] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.680794][T15672] __x64_sys_rename+0x61/0x80 [ 402.707053][T15672] do_syscall_64+0x103/0x610 [ 402.707074][T15672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.707085][T15672] RIP: 0033:0x458c29 [ 402.707101][T15672] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.707109][T15672] RSP: 002b:00007f24d472cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 402.707123][T15672] RAX: ffffffffffffffda RBX: 00007f24d472cc90 RCX: 0000000000458c29 [ 402.707132][T15672] RDX: 0000000000000000 RSI: 0000000020887ff8 RDI: 0000000020fdbff8 [ 402.707141][T15672] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 402.707157][T15672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24d472d6d4 04:42:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x208008, &(0x7f0000000280)={[{@workdir={'workdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@metacopy_off='metacopy=off'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}], [{@audit='audit'}, {@obj_type={'obj_type'}}, {@fowner_lt={'fowner<', r1}}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 402.707166][T15672] R13: 00000000004c5bb9 R14: 00000000004da1a8 R15: 0000000000000005 04:42:38 executing program 0 (fault-call:4 fault-nth:4): r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x0) 04:42:40 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x6, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x3008010, &(0x7f0000000680)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^#c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0flp\xf8\xee\x97\xc7\x87\xf4\x82>&\xc0\x10\x9347\xcb\xfa\xcd\xb6\x98=*\r\ryl\x9c\xcc\xe2\xa5C\xe3\xfd\xe8\xc7f|\xb1\x93\xbd\x8e\xbdC\xae\xa1r\x9b5\x15\xaf\x1b\x1e\x98\xd1\x8a\x12S\x17\xba\xab\xb3\x8dF\x93\xa8t\xc4%\xc0\xd6\xbf[\x8e\x02\xe0\xc7If\xb4V\x8cy\xba5(v&MVI\x84`\x15]\xd5E)>\xf2\x94\xe2\x1e<\xe6\x91\xc4,\x1a\xffH\xb6\xc8\xe4\xb7\xf6\t\x11)`\x05\x97Y\xed\"\xb7W\x0f\xa6\xcdr\xf8\x13\x1d\xa7\x1b\x00\xde\x04\x82b-\xc3\xa18acc\xf5\xf0\xc0\xbd`\xb5D\xf6\xfc\xf5\xbdx\x82tz\x88\x14\xe1\x1b\t\xb39&\xab\xa1\xf9XJ\"\xf5f@\xa6\x18\xbeg\xd2\x84e\x8c\x88\xa4\xfcl\b\xb5\xceS\xdd\x11\xa9\x1e\xf2A\xc3\x03\xaa\xdd4\xef\xd2\xd9w~\xa4E\x85!C\xf0\f\xa6\n\xc0\xd0\xdaK\xd24\\\xc9u\x1c\x1e\x80\xd2') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:40 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:40 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000001, r2) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000180)={0x3f, 0x3, 0x1}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) getdents64(r3, &(0x7f0000000040)=""/112, 0x70) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x4) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) getdents(r3, &(0x7f0000000300)=""/46, 0x2e) 04:42:40 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) sendto$inet(r0, &(0x7f0000000600)="d0e1afeea80c40bb6f75d08038b718f7ffb3e86163690209dc8fad405adcb5264912d4a36a69fe572695f0d76695832022cc725f5fea09ad9bae377c210b8b06a2047caa7894fd864b908cf313b3f4ff50068ca91c2b44611a5d7fd4da46084cede804ce411f8b807fe18eebbbca12dc3816ad440949e5c2b691c052364aaa064205fa856ee79c15017318cebcb377cc50441b3965a821583423c24915e28e9daa0a8820ed4ac1136619bb70844d654baf481a5cf2a42a89f450cca0150feec31ca5b2e049c49ce7257f969885e5955afa57e35cbc55f0518ddb01c9", 0xdc, 0x4008000, &(0x7f0000000700)={0x2, 0x4e24, @rand_addr=0xffffffff}, 0x10) r2 = getuid() stat(&(0x7f00000002c0)='./file2\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0x9, 0x2, &(0x7f0000000240)=[{&(0x7f0000000080)="38b1e198b1df6dade5c9e4f406b8ee8bed8d60863cfe3678321eba81d5a3292d69f7e9d329d96768ada8445cb622d66b92d61ad7d158375122856d70e30ead6831b4a6ef5b1336cf0cdecf0123c674d1b4810bf227c88aefbc8f99e4199fd8f040d0bb80dbc4ffad7818557a39657af3a61827a4bad8ec76c2ce854fdd5226c61fc09f6a2d7fea357c21b087118d0827a6759dc52b", 0x95, 0x100000001}, {&(0x7f0000000140)="df75959ba239613ec794e96620e4b4d94da9a529f67a38a103c9ad20ad946fc2cd60fad7624047ab67285a120c5bac693cef085d66484c254fefef7adbe3b85cf7af8d59db8b4ada5173c82c307063a56d0d1e143e3ffe70046d69ed108679656e74db8c45512e1512d8d1a75cb64d0bc5355bd960db278c394cdb4cb575cf5d45e4cf963da287729b91a8cdee9ee89027ada8036b8640b14b331d77fe883972359effa14a200ddb86d68fffe6af45153fe31bed99b01e452de9100a494e9d1e2f9de3dade5e485ca7274dcb1744daa1d728a2ad560727820e22ce7f82f4d6d8", 0xe0}], 0x2000050, &(0x7f00000004c0)={[{@space_cache_v2='space_cache=v2'}, {@ssd='ssd'}, {@subvol={'subvol', 0x3d, '\\:+'}}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':user\''}}, {@fowner_gt={'fowner>', r2}}, {@euid_lt={'euid<', r3}}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}, {@fowner_gt={'fowner>', r4}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vboxnet1\\trustedsystem'}}]}) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') syz_open_dev$sndctrl(&(0x7f00000005c0)='/dev/snd/controlC#\x00', 0xc2b, 0xa0c00) 04:42:41 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x800, 0x400) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) ioctl$TCFLSH(r0, 0x540b, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff034017db9820000000003b08d450ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c597e9ce5cccf7942003606004079025f759e9f5d54076bb47f57f3"], 0x58) dup(r1) ioctl$SG_GET_NUM_WAITING(r1, 0x2286, &(0x7f00000001c0)) 04:42:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x101000, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r1}) bind$netlink(r2, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x44}, 0xc) 04:42:41 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2000, 0x1) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, r2, 0x400) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000640)={0xffffffffffffff9c}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'pids'}, {0x0, 'rdma'}, {0x2d, 'memory'}, {0x2b, 'memory'}, {0x0, 'memory'}, {0x0, 'io'}]}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff}, [@jmp={0x5, 0x0, 0x4, 0x5, 0xe, 0x6}, @ldst={0x0, 0x2, 0x7, 0x1, 0x3, 0xffffffffffffffff, 0xfffffffffffffffd}, @generic={0x7, 0xfffffffffffffffe, 0x0, 0x0, 0x3}]}, &(0x7f0000000200)='syzkaller\x00', 0x4, 0x3, &(0x7f0000000240)=""/3, 0x41f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x9}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xfffffffffffff800, 0x4, 0x5}, 0x10}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x1, 0x4) [ 405.526138][T16111] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 405.552442][T16111] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:41 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) sendfile(r0, r0, &(0x7f0000000140), 0x4c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd07097995d4153a50a99883be63aeb2f5bdcb1c1104dc8674154adc9b10551f5d9add7c9d9ce606969cfad4c7079b368e7e896789f7da835a7357d0fb277448b11c1312dc10833c99b15aa4c4c43ab9406d0921896e136305a4c5745dda15b814d3447a002dec7fdc5696e73b81d408680a190cae997e0f9d2774ce2b0c29aa1c93ae827de3e04d0592288c08d27de886313f56491ddab6ee51039e2e5d56f6afbc823306b405012140062080a7222624b88e7") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 405.574354][T16111] Error parsing options; rc = [-22] 04:42:42 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000300)="20d5", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x0) 04:42:42 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0xc, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = dup2(0xffffffffffffff9c, r0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0xa0001, 0x0, [0x7a0, 0x10000, 0x5, 0xfff, 0xfffffffffffffffb, 0x4, 0xffffffffffff8000, 0x1ff]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:42 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x6, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:42 executing program 0: r0 = open(&(0x7f0000000080)='.\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$setlease(r0, 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0x1000, 0x0, 0x4}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x343a}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x2}, &(0x7f0000000200)=0x8) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 407.226533][T16329] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 407.246511][T16329] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:43 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) fcntl$setlease(r0, 0x400, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000000)={0x6, 0x4}) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 407.289468][T16329] Error parsing options; rc = [-22] 04:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f445c7bc9069bc504") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:43 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file1\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="39000000130009006900000000000000ab0080482900000046000107a277001419000a000d00000000001bf5000000004800ef38bf461e59fd", 0x39}], 0x1) bind(r0, &(0x7f0000000080)=@x25={0x9, @remote={[], 0x0}}, 0x80) [ 407.505292][T16559] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 407.525282][T16559] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 407.587509][T16559] Error parsing options; rc = [-22] 04:42:43 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x12, &(0x7f00000003c0)={0x0}}, 0x0) [ 407.630453][T16568] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 407.673365][T16568] bridge0: port 3(hsr_slave_1) entered blocking state [ 407.707465][T16568] bridge0: port 3(hsr_slave_1) entered disabled state 04:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:43 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000300)="20d5", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) [ 407.827553][T16776] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 407.925837][T16776] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 407.953473][T16776] Error parsing options; rc = [-22] 04:42:45 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000300)="20d5", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:45 executing program 5: mkdir(&(0x7f0000000000)='./file1/../file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) listxattr(&(0x7f0000000180)='./file1/../file0\x00', &(0x7f00000000c0)=""/96, 0xfffffffffffffe79) 04:42:45 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 04:42:45 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0xf0, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000180)={r1, r2/1000+30000}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) sched_setparam(r3, &(0x7f0000000100)=0x7fff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:45 executing program 1: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x12, &(0x7f00000003c0)={0x0}}, 0x0) [ 409.489433][T16903] overlayfs: failed to resolve './file1': -2 04:42:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:45 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0x9}, 0x28, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 409.558037][T16970] overlayfs: failed to resolve './file1': -2 04:42:45 executing program 5 (fault-call:4 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:45 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x600, &(0x7f00000003c0)={0x0}}, 0x0) [ 409.662351][T17017] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 409.753800][T17017] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:45 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x109000, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="58034849960300000000000000008000000000000031cf16fa0751d8b1c751fe0000"]) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 409.816359][T17017] Error parsing options; rc = [-22] 04:42:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000440), 0x10) sendmsg$can_bcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="0500"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000010e0000002389112b3587b2f5e93489ca47e9a567a6261a941bcae05adf0decde6fbe9eb5552bf12a474e9ab54931a39730e5"], 0x48}}, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x18280, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x8) sendmsg$can_bcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x5, 0xb40, 0x0, {0x77359400}, {0x0, 0x7530}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4059ea17b4fe0178b375245e7e98a0ba3283f0ca57f16ead33dd659d48114c58b45a2b76edb29428a4bcc8ac493663e6d195de50385ce6c4317c291aa77c17f3"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00000001c0)={0x0, 0x34000, &(0x7f0000000180)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a9eb28d9d1b159c7"}}, 0x48}}, 0x0) 04:42:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) 04:42:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000480)={0x9, 0x108, 0xfa00, {r2, 0xc5, '0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r4, 0xed, "6c3b86", "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"}}, 0x110) 04:42:45 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0xc00, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r1}) creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl(r0, 0x1800008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v2, 0x14, 0x0) listen(r0, 0xd4f) creat(&(0x7f0000000040)='./file0\x00', 0x0) 04:42:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x12) write$FUSE_POLL(r1, &(0x7f0000000180)={0x6, 0x0, 0x1, {0x1f}}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000140)) 04:42:45 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x8f, "a4a79909151f3b97fb196792434c488a2ed630e14d65476364ca2e92685b5fdd52d98adc1672ecf6b2bd1b0f756b1372d10d6a2ad10be2ff0831e861ac4dc0b9b30fe4d0b41c7d86d2cdd4b8ae3a141c273935c82b301e5b16e6b57d7045f7e3d38b1deaeabab2c586f37cb20971ea7f4c2f61f70472ab7975fd5c5100d514d9f0a943d4e378f866b6ae278c2fb52e"}, &(0x7f00000000c0)=0x97) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r2, 0x4) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x2, 0x1}, 0x1}}, 0x18) 04:42:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x9400) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000740)='/dev/binder#\x00', 0x0, 0xfffffffffffffffe) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000004c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr=0x88000088, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) poll(&(0x7f0000000440)=[{}, {}, {}], 0x3, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f00000001c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) sysfs$1(0x1, &(0x7f0000000140)='mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 ') mkdirat(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r3, &(0x7f0000000540)) r4 = syz_open_dev$adsp(0x0, 0x401, 0x8853ebd796b63f81) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="44aa3bc0d4bf0c76d9a8ff84b62d0ee12142c7ed4c78a5f563749670245a3e94cad7c13dd86febcbcab63f311e891fdc71d4288a697a1c81ef244e2bbdc7690b5b09ffe77c13eaba510f4aca50761950b0b8ac6e437745c480e674cfdd5365499eb0d87e2a6a4c2e9f62301107514e5fe0714d2d0bdc50d198ce74ae613f8147405e6504af2fda964fb173603af01d9da67899623061cfd012294a8b79164e9ff9e2e83d8ae82d1a1ce1384348e02038e3ad17917e5a72132fe539a9f87084868e549a617200ab356be77c94a1bf480055cefbeab75b"], 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000240)=0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000480)='dummy0\x00', 0x10) fanotify_mark(r1, 0x400000000000007d, 0x103a, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) quotactl(0x3, &(0x7f0000000000)='./file1\x00', r5, &(0x7f00000003c0)="5db6b566aebea2778de435cab543242cc1a8bef998056a7034f73dd7f568d7701095d983e992bff9c4ed9bd67329e54bdf5e3decca714512dc7ee1eb8d590ba099ec3c7dc6f52cd82ada7a0bddcd623b78563ff881c6512c473114c5b4657240c569293dab9f253ec711") 04:42:46 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 410.243569][ T26] audit: type=1800 audit(1555476165.960:54): pid=17372 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16628 res=0 [ 410.279197][T17372] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 410.333363][T17372] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.424088][T17372] Error parsing options; rc = [-22] 04:42:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) 04:42:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) syz_mount_image$erofs(&(0x7f0000000100)='erofs\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x5, &(0x7f0000000540)=[{&(0x7f0000000180)="233fcd3d30759904d5535e5db237df214ecc7ffc0c0ad59418829e04dc6e130ed4c86b29bf72d1a50b3c1ae96511", 0x2e, 0x10001}, {&(0x7f00000001c0)="acd8ae2b74bf0aedefe0d50ba706fca7da67372a21ee0f0b5797b15108392ad68e84cb09a49f2664785407c93aa453cd69a1cea4fc5003e9511a213d887ba278f20a7821d41fdc30a477f9a55e874caceb9809461a2d0eac7da47b6ae898476411c4", 0x62, 0x57e}, {&(0x7f0000000240)="90b0cbf21a35f8092e17921cff246df7aa05462cf4141bd52fd21d5e6c530cf25fbd1ca1ab36b61ad590249355ed98e91663f066746b3699e76a249e2c4b62a5dba447c4510dd57789986a39c2f27cad3feb67412c488877276caade05b9de564ac7e5207aff3f54a148334924e2b5d5d7f1a3666c9c32a356a299bf58fcfbe7829bde3c654d28ee82efe431056ab27ba15525df646a7c0e46df2470532d12200ddaf55ea27772232bf9016f1f66b580252ca9ceedad6fabc62b3f1e93e59d966e20ea4d1ab7799e0e40a315abedf8449d6b49dde87fdfea1a0ad89e0c42db9cb81861fc925e1c67ca69c5d9baa358754e6c04a3d7d05d3993", 0xf9, 0x9}, {&(0x7f0000000440)="3b9e749db0b55fb6cc8aad1e2274d72355415184dc3c3f26d2a89792826b10c33a39", 0x22, 0x10000}, {&(0x7f0000000480)="bba75b873002f01390c1e3821068ae087aef9407e15e0c3bcaa2d39c40a4a3e73b0aecc3d4143f7b6845c27c6ed21fed9556e3b581ccc9e0aece4dd60254475b6d09e2b3cf7cad86ce74bcfc2a132f15b9c8eb9e4702a26a6e88cb4d8f779fd711f9db5dc66b547117f6747ec6250bcc9a6a92ad5be8287b84d495a76bd72ac9cf5645adcc8be6b55c0a1891902fc32e2f935e34f2", 0x95, 0x55}], 0x20, &(0x7f0000000740)={[{@fault_injection={'fault_injection', 0x3d, 0x1ff}}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@nouser_xattr='nouser_xattr'}, {@nouser_xattr='nouser_xattr'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'IPVS\x00'}}, {@uid_gt={'uid>', r1}}, {@dont_appraise='dont_appraise'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ecryptfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'IPVS\x00'}}, {@fowner_gt={'fowner>', r2}}]}) 04:42:47 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x1200, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:47 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$void(r1, 0x5454) fcntl$setlease(r0, 0x400, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x2, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x9400) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000740)='/dev/binder#\x00', 0x0, 0xfffffffffffffffe) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000004c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr=0x88000088, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) poll(&(0x7f0000000440)=[{}, {}, {}], 0x3, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f00000001c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) sysfs$1(0x1, &(0x7f0000000140)='mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 ') mkdirat(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r3, &(0x7f0000000540)) r4 = syz_open_dev$adsp(0x0, 0x401, 0x8853ebd796b63f81) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="44aa3bc0d4bf0c76d9a8ff84b62d0ee12142c7ed4c78a5f563749670245a3e94cad7c13dd86febcbcab63f311e891fdc71d4288a697a1c81ef244e2bbdc7690b5b09ffe77c13eaba510f4aca50761950b0b8ac6e437745c480e674cfdd5365499eb0d87e2a6a4c2e9f62301107514e5fe0714d2d0bdc50d198ce74ae613f8147405e6504af2fda964fb173603af01d9da67899623061cfd012294a8b79164e9ff9e2e83d8ae82d1a1ce1384348e02038e3ad17917e5a72132fe539a9f87084868e549a617200ab356be77c94a1bf480055cefbeab75b"], 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000240)=0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000480)='dummy0\x00', 0x10) fanotify_mark(r1, 0x400000000000007d, 0x103a, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) quotactl(0x3, &(0x7f0000000000)='./file1\x00', r5, &(0x7f00000003c0)="5db6b566aebea2778de435cab543242cc1a8bef998056a7034f73dd7f568d7701095d983e992bff9c4ed9bd67329e54bdf5e3decca714512dc7ee1eb8d590ba099ec3c7dc6f52cd82ada7a0bddcd623b78563ff881c6512c473114c5b4657240c569293dab9f253ec711") [ 412.087857][T17598] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:47 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) r2 = getgid() fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x800000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none='cache=none'}, {@afid={'afid', 0x3d, 0x9}}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@dfltuid={'dfltuid', 0x3d, r3}}], [{@fsmagic={'fsmagic', 0x3d, 0x80000000}}, {@euid_eq={'euid', 0x3d, r4}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, '^system-.keyring'}}, {@obj_user={'obj_user', 0x3d, '-vmnet0*'}}, {@smackfshat={'smackfshat', 0x3d, '-GPLvboxnet0$%[selinux'}}, {@seclabel='seclabel'}]}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 412.128256][T17598] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:42:47 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x2639, &(0x7f00000003c0)={0x0}}, 0x0) [ 412.284630][T17598] Error parsing options; rc = [-22] 04:42:48 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc41652b51b51c39021f76ead7042432050000006e3cbbae59d61bc18a2ace342bd6cdb9cf2330a7f962c6db749f3d54afd4da4e4c20a00836381af3db977a631500001000"/80) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000000c0)={0x57, 0x6, 0x3, {0x1, 0xff}, {0x8, 0xf7}, @period={0x5e, 0x6, 0x0, 0xffffffff, 0x0, {0x9, 0x80, 0x8, 0xeb}, 0x6, &(0x7f0000000080)=[0x10001, 0x6, 0x340, 0x6, 0xffffffff, 0x100000000]}}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0x80000001, 0x7fffffff, 0xfffffffffffffffa, 0x1}) 04:42:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x16, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000ce23a7070000004c000000000000009500000000"], &(0x7f0000281ffc)='G\xffL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x9}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f00000000c0)="c10e85f98ad0e679055e19f25b0d", 0x0, 0x1f36}, 0x28) [ 412.474312][T17726] cgroup: fork rejected by pids controller in /syz2 [ 412.541120][T17733] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) [ 412.591840][T17733] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.633484][T17733] Error parsing options; rc = [-22] 04:42:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x12, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) r2 = dup3(r1, r1, 0x80000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r3, 0x5}, &(0x7f00000001c0)=0x8) 04:42:50 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) ioctl(r0, 0x80000000, &(0x7f0000000040)="73a0f23f3b61b31dd9f2dc8475db52c1ddc39400772f54060af431b5cec55ce2b9e383d6a3da75fc81afd8d5d5a85c54edd135e8ef5718327d067d5e1c8c3f2bbcee3de8464137626f2c258ca19722fa06f38b8247b0b02900e850cd78ee32f814e918eeef967d3e324804bf02599a976233ca") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x2) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7ff, 0x208040) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) sendmsg$can_bcm(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x1d, r2}, 0x10, &(0x7f00000004c0)={&(0x7f0000000440)={0x7, 0x318, 0x3, {}, {0x77359400}, {0x1, 0x2, 0x1, 0xffffffffffffffff}, 0x1, @canfd={{0x4, 0xc8, 0x4}, 0x1c, 0x1, 0x0, 0x0, "6e60af591c9beffa772aefa1586632e0a8749c5566a6157fc3e73b1d864764b58a2844761a6f10d42d2418018d7abac1a968c0ec41abab77ea46b38fba9b1bce"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000045}, 0x4000041) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)={0x4, 0x0, 0xffffffff, "bdea43ed"}) 04:42:50 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x3926, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:50 executing program 3 (fault-call:5 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x2, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 414.357860][T18055] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 414.376097][T18064] (unnamed net_device) (uninitialized): option min_links: invalid value (18446744073709551615) [ 414.392779][T18055] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 414.401426][T18066] FAULT_INJECTION: forcing a failure. [ 414.401426][T18066] name failslab, interval 1, probability 0, space 0, times 0 [ 414.413134][T18055] Error parsing options; rc = [-22] [ 414.427597][T18064] (unnamed net_device) (uninitialized): option min_links: allowed values 0 - 2147483647 [ 414.455550][T18066] CPU: 0 PID: 18066 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 414.463566][T18066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.473634][T18066] Call Trace: [ 414.476960][T18066] dump_stack+0x172/0x1f0 [ 414.481314][T18066] should_fail.cold+0xa/0x15 [ 414.485917][T18066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.491741][T18066] ? ___might_sleep+0x163/0x280 [ 414.496602][T18066] __should_failslab+0x121/0x190 [ 414.501558][T18066] should_failslab+0x9/0x14 [ 414.506070][T18066] kmem_cache_alloc_node_trace+0x270/0x720 [ 414.511904][T18066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.517373][T18066] __kmalloc_node+0x3d/0x70 [ 414.521884][T18066] kvmalloc_node+0x68/0x100 [ 414.526398][T18066] alloc_netdev_mqs+0x98/0xd30 [ 414.531169][T18066] ? ppp_get_stats64+0x3b0/0x3b0 [ 414.536116][T18066] ppp_ioctl+0x17c9/0x25f7 [ 414.540545][T18066] ? ppp_input_error+0x210/0x210 [ 414.545494][T18066] ? ___might_sleep+0x163/0x280 [ 414.550359][T18066] ? ppp_input_error+0x210/0x210 [ 414.555308][T18066] do_vfs_ioctl+0xd6e/0x1390 [ 414.559936][T18066] ? ioctl_preallocate+0x210/0x210 [ 414.565061][T18066] ? selinux_file_mprotect+0x620/0x620 [ 414.570527][T18066] ? __fget+0x381/0x550 [ 414.574701][T18066] ? ksys_dup3+0x3e0/0x3e0 [ 414.579136][T18066] ? tomoyo_file_ioctl+0x23/0x30 [ 414.584081][T18066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.590331][T18066] ? security_file_ioctl+0x93/0xc0 [ 414.595452][T18066] ksys_ioctl+0xab/0xd0 [ 414.599619][T18066] __x64_sys_ioctl+0x73/0xb0 [ 414.604224][T18066] do_syscall_64+0x103/0x610 [ 414.608827][T18066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.614722][T18066] RIP: 0033:0x458c29 [ 414.618630][T18066] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.638246][T18066] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 414.646667][T18066] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 04:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') [ 414.654643][T18066] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000003 [ 414.662622][T18066] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 414.670602][T18066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 414.678579][T18066] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 04:42:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010005c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) ioctl(r0, 0x1000008913, &(0x7f0000000280)="0adc1f123d123f319bdc709a65d89bcb14d8eda017bb568b71c661fa47c35f2fce8800ffe6653516b6cfc55f6fd7eb99eaf3f36339b6c4caf872fced95b5f7d7bed807468ce6f7d419aa1867865c28249ffe387c663596110464213b5c9662dd9f932c17d6e29f4c867c116e19cd337febe01989bb6d83a67650582a452fea299e870b7690ecdb90553f56207b2d81f1a90959dc73c7b9e40dc2f0a8374728984e830aca2776cd1da832707a582c5db1d448cb1ff08c345255d857086d0759a408c89089c771d839ea3dc36fc0879a547af8e2119b3ca7966cbb025d7e4629f4f6a700") r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x80, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x7) r3 = socket(0x2, 0x7, 0x7) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0xd, 0x2, {{0x1, 0x3, 0x5}, 0x10001}}, 0x18) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@dev, @in=@local}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000200)={0x0, 0x0}) move_pages(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000ffb000/0x4000)=nil], 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') getsockopt$sock_buf(r3, 0x1, 0x24, &(0x7f0000e530e9)=""/16, &(0x7f00000001c0)=0x10) 04:42:50 executing program 0: r0 = open(&(0x7f0000000180)='\x00', 0x3, 0x3c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r2}}, 0xc) fcntl$setlease(r0, 0x400, 0x3) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 414.762351][T18330] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:50 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x3f00, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:50 executing program 3 (fault-call:5 fault-nth:1): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 414.838279][T18330] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 414.849243][T18383] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 414.930623][T18330] Error parsing options; rc = [-22] 04:42:50 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x268e80, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) pidfd_send_signal(r1, 0x4, &(0x7f00000000c0)={0x21, 0x82, 0x5a53}, 0x0) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) fcntl$setlease(r2, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x44000, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000240), 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='ecryptfs\x00', 0x0, &(0x7f0000000440)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\t\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0flb\x163\xef\x12\xb1<\x03\x18\xa5\x1b?{\xecYt\x80b\xee\x1d\xd5>\xb1\x8f6\xadN\xc3\x8b\xfe\x98f\\\x02F\b\xb6=\xbc.\xb3<\xa6\x98\xac\xcfKU\xb0\xe2:\xfb\x1a\xec\xca\xf7\xd8#\xf2\xae\xc47\xff\xd1\n\vqC\xf3\x9b\x13r\xa1exDF5\x17\xd8\x94x\xb8W\xd7\xd4Na\xc1p\xf3\xd2\xbcC\x99F\x18\xc0\xb4\xca-K\xa6EN\xf0\xe0\xc5\x19,\x0f\x19\x96K\x98\xad\xf0\x0el\x8dt\xeb\xb9\xffq\x1b\xd6\xce\xe6\'I\x88\t\x93\x9dq1>,\xaf\xae\x84\xf7\x96\xebX\xdf\x13\xa5\xa5\x8b\x8c\x91\x99e\x9c\xfe\x81\xca\x04-_C\x9f\xfa\xd4E\xab\xe9\xa0\x05\xf0d\x9f\xc1\xf2v8\a\xd9E%~\xe7r\xe4\xa4\x91\x8a\xb9\xb3\x19\xdbu\xe4\x05\xa4a\x01c\xc7\xf2J\xb3\xd9') openat$cgroup_type(r1, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x101000, 0x0) [ 415.032223][T18609] FAULT_INJECTION: forcing a failure. [ 415.032223][T18609] name failslab, interval 1, probability 0, space 0, times 0 [ 415.100015][T18609] CPU: 1 PID: 18609 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 415.108031][T18609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.118096][T18609] Call Trace: [ 415.121423][T18609] dump_stack+0x172/0x1f0 [ 415.125787][T18609] should_fail.cold+0xa/0x15 [ 415.130484][T18609] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.136312][T18609] __should_failslab+0x121/0x190 [ 415.141261][T18609] should_failslab+0x9/0x14 04:42:50 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0xf000, &(0x7f00000003c0)={0x0}}, 0x0) [ 415.145771][T18609] kmem_cache_alloc_trace+0x4b/0x760 [ 415.151076][T18609] __hw_addr_create_ex+0x5e/0x310 [ 415.156113][T18609] __hw_addr_add_ex+0x1ef/0x2b0 [ 415.160981][T18609] dev_addr_init+0x118/0x200 [ 415.165581][T18609] ? dev_mc_flush+0x40/0x40 [ 415.170101][T18609] ? __kmalloc_node+0x4e/0x70 [ 415.174794][T18609] alloc_netdev_mqs+0x142/0xd30 [ 415.179656][T18609] ? ppp_get_stats64+0x3b0/0x3b0 [ 415.184602][T18609] ppp_ioctl+0x17c9/0x25f7 [ 415.189031][T18609] ? ppp_input_error+0x210/0x210 [ 415.193985][T18609] ? ___might_sleep+0x163/0x280 [ 415.198854][T18609] ? ppp_input_error+0x210/0x210 [ 415.203836][T18609] do_vfs_ioctl+0xd6e/0x1390 [ 415.208461][T18609] ? ioctl_preallocate+0x210/0x210 [ 415.213588][T18609] ? selinux_file_mprotect+0x620/0x620 [ 415.219059][T18609] ? __fget+0x381/0x550 [ 415.223231][T18609] ? ksys_dup3+0x3e0/0x3e0 [ 415.227666][T18609] ? tomoyo_file_ioctl+0x23/0x30 [ 415.232612][T18609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.238872][T18609] ? security_file_ioctl+0x93/0xc0 [ 415.243997][T18609] ksys_ioctl+0xab/0xd0 [ 415.248176][T18609] __x64_sys_ioctl+0x73/0xb0 [ 415.252782][T18609] do_syscall_64+0x103/0x610 [ 415.257427][T18609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.263320][T18609] RIP: 0033:0x458c29 [ 415.267232][T18609] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.286833][T18609] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:42:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = shmget$private(0x0, 0x3000, 0x880, &(0x7f0000ffb000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x0, 0x40041) ioctl$EVIOCGABS20(r6, 0x80184560, &(0x7f0000000500)=""/18) r7 = fcntl$getown(r0, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f00000003c0)=']{vmnet0{\x00'}, 0x30) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000440)={{0x10000, r2, r3, r4, r5, 0x4, 0x6}, 0x9, 0x9, 0x2, 0x100, r7, r8, 0x3}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$TIOCMIWAIT(r10, 0x545c, 0x0) ioctl$TIOCGISO7816(r9, 0x80285442, &(0x7f0000000040)) ioctl$sock_ifreq(r9, 0x8000000008b2b, 0x0) [ 415.295250][T18609] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 [ 415.303221][T18609] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000003 [ 415.311193][T18609] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 415.319170][T18609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 415.327143][T18609] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 [ 415.381046][T18697] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:51 executing program 3 (fault-call:5 fault-nth:2): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fdatasync(r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)=0x0) getpgid(r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8b90936d300081452b05eece1d72024c6c7989"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000800)=ANY=[]) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) read(r5, &(0x7f0000000a40)=""/169, 0xffffffffffffff48) recvmmsg(0xffffffffffffffff, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/127, 0x7f}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/17, 0x11}, {&(0x7f0000000580)=""/225, 0xe1}, {&(0x7f00000007c0)=""/4, 0x4}, {&(0x7f0000000800)}], 0x4, &(0x7f00000008c0)=""/91, 0x5b}, 0x3}], 0x2, 0x0, 0x0) r6 = accept4(r4, 0x0, &(0x7f0000000100), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f0000000800)=0x9, &(0x7f0000000a00)=0x4) getsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000140), &(0x7f0000000180)=0x4) setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='\x00', 0x1, 0x3) dup2(r4, r5) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x0, 0x5, [0x5, 0x0, 0x3, 0x1, 0x5]}, &(0x7f0000000300)=0x12) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000040)) [ 415.447466][T18697] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 415.517304][T18697] Error parsing options; rc = [-22] [ 415.744695][T18999] FAULT_INJECTION: forcing a failure. [ 415.744695][T18999] name failslab, interval 1, probability 0, space 0, times 0 [ 415.766778][T18999] CPU: 1 PID: 18999 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 415.774861][T18999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.784920][T18999] Call Trace: [ 415.788228][T18999] dump_stack+0x172/0x1f0 [ 415.792577][T18999] should_fail.cold+0xa/0x15 [ 415.797194][T18999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.803022][T18999] ? ___might_sleep+0x163/0x280 [ 415.807886][T18999] __should_failslab+0x121/0x190 [ 415.812829][T18999] should_failslab+0x9/0x14 [ 415.817350][T18999] kmem_cache_alloc_node_trace+0x270/0x720 [ 415.823180][T18999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.829428][T18999] ? dev_addr_init+0x17f/0x200 [ 415.834205][T18999] __kmalloc_node+0x3d/0x70 [ 415.838720][T18999] kvmalloc_node+0x68/0x100 [ 415.843227][T18999] alloc_netdev_mqs+0x67f/0xd30 [ 415.848081][T18999] ? ppp_get_stats64+0x3b0/0x3b0 [ 415.853027][T18999] ppp_ioctl+0x17c9/0x25f7 [ 415.857451][T18999] ? ppp_input_error+0x210/0x210 [ 415.862405][T18999] ? ___might_sleep+0x163/0x280 [ 415.867266][T18999] ? ppp_input_error+0x210/0x210 [ 415.872211][T18999] do_vfs_ioctl+0xd6e/0x1390 [ 415.876809][T18999] ? ioctl_preallocate+0x210/0x210 [ 415.881922][T18999] ? selinux_file_mprotect+0x620/0x620 [ 415.887382][T18999] ? __fget+0x381/0x550 [ 415.891555][T18999] ? ksys_dup3+0x3e0/0x3e0 [ 415.895992][T18999] ? tomoyo_file_ioctl+0x23/0x30 [ 415.900939][T18999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.907191][T18999] ? security_file_ioctl+0x93/0xc0 [ 415.912309][T18999] ksys_ioctl+0xab/0xd0 [ 415.916475][T18999] __x64_sys_ioctl+0x73/0xb0 [ 415.921075][T18999] do_syscall_64+0x103/0x610 [ 415.925699][T18999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.931597][T18999] RIP: 0033:0x458c29 [ 415.935495][T18999] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.955104][T18999] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 415.963521][T18999] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 [ 415.971493][T18999] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000004 [ 415.979466][T18999] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 415.987436][T18999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 415.995420][T18999] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 04:42:54 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x4b47, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:54 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x4010, r0, 0x0) r2 = mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000002, 0x10, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xdc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0c630000116348400400000000009f20d6599f00000400000000000000000000001000000000000000000000004000000000000000100000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="852a747001000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000000000000000000002c00000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="644200000000000012634840010000000000000003000000000000000000000011000000000000000000000000000000000000002800000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000763044004000000076304400100000007630440020000000c63000010630840070000000000000003630840", @ANYRES64=r1, @ANYBLOB="03630840", @ANYRES64=r2], 0xe9, 0x0, &(0x7f0000000300)="8253620566e95051b88ea639e2a874ddfd095a1d699712b6c983de5692b8241ab0e5af19db6f2da5de775f2ceac9d4a6a7c744a9a52dd06bda12fb325ec19baedc91745ad7a17b9b3841f1a26d2b35d171c54c08e3c0c3cebedc8eb85f289f72384cb8a1ecaf38b39d670d255e6dbae6c57f1783c6d72a03a0e7c02bd2fe492925b2cc74286758ad1df47d8df837aefc60aeaac535b002e8e7057fa35153a01541f620c06bceed8bb8227257d607b9d6e768930383641fe4b1a1ce37ad925806059b9e3d1a2e61418246622c8ce4e69dfc6fb13f7cf13c8cc94f31d6eec1269c203a1c74ec3ba22639"}) connect(r0, &(0x7f0000000480)=@generic={0x0, "3292f1580adb58bb7a00ec81421ea28e69007fd3916050b6ec01be40e50146f8a736036cd6bb3f3b39ade022596cabf17da4c5abff75fd0e15a855dc95272280b3c70ab3021db14a97f057710b7f8897dafd9a72d013f62760c0babf70c862ff1528a357182277570ab4646720b9dd07b0d885077c92eff090a7af185033"}, 0x80) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000040)=[@enter_looper, @register_looper], 0x0, 0x2, 0x0}) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, 0x5) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x35) shutdown(r5, 0x1) prctl$PR_GET_SECCOMP(0x15) 04:42:54 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000040)='./file1\x00') 04:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000100)="0adc1f123c923f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x10800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000180)={0x8}, 0x1) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mmap$binder(&(0x7f0000fec000/0x12000)=nil, 0x12000, 0x8, 0x6f268278f07f4656, r2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:54 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0xf0ffff, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:54 executing program 3 (fault-call:5 fault-nth:3): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 418.439633][T19022] binder: 19020:19022 got transaction to invalid handle [ 418.450820][T19022] binder: 19020:19022 transaction failed 29201/-22, size 70368744177664-17592186044416 line 2995 [ 418.504314][T19022] binder: 19020:19022 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER [ 418.547277][T19122] FAULT_INJECTION: forcing a failure. [ 418.547277][T19122] name failslab, interval 1, probability 0, space 0, times 0 04:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2001, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x8ccf, 0x3ff, 0x7, 0x1, 0x4}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0x2}, 0x8) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') [ 418.617565][T19033] binder: 19020:19033 got transaction to invalid handle 04:42:54 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0xa00000000000) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x5) [ 418.664971][T19033] binder: 19020:19033 transaction failed 29201/-22, size 70368744177664-17592186044416 line 2995 [ 418.704583][T19122] CPU: 1 PID: 19122 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 418.712611][T19122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.722675][T19122] Call Trace: [ 418.725986][T19122] dump_stack+0x172/0x1f0 [ 418.730339][T19122] should_fail.cold+0xa/0x15 [ 418.734966][T19122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 418.740794][T19122] ? ___might_sleep+0x163/0x280 [ 418.745662][T19122] __should_failslab+0x121/0x190 [ 418.750613][T19122] should_failslab+0x9/0x14 [ 418.755129][T19122] kmem_cache_alloc_node_trace+0x270/0x720 [ 418.760952][T19122] ? kasan_unpoison_shadow+0x35/0x50 [ 418.766258][T19122] __kmalloc_node+0x3d/0x70 [ 418.770771][T19122] kvmalloc_node+0x68/0x100 [ 418.775288][T19122] alloc_netdev_mqs+0x821/0xd30 [ 418.780158][T19122] ppp_ioctl+0x17c9/0x25f7 [ 418.784609][T19122] ? ppp_input_error+0x210/0x210 [ 418.789562][T19122] ? ___might_sleep+0x163/0x280 [ 418.794430][T19122] ? ppp_input_error+0x210/0x210 [ 418.799383][T19122] do_vfs_ioctl+0xd6e/0x1390 [ 418.804007][T19122] ? ioctl_preallocate+0x210/0x210 [ 418.809129][T19122] ? selinux_file_mprotect+0x620/0x620 [ 418.814610][T19122] ? __fget+0x381/0x550 [ 418.818783][T19122] ? ksys_dup3+0x3e0/0x3e0 [ 418.823217][T19122] ? tomoyo_file_ioctl+0x23/0x30 [ 418.828180][T19122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.834466][T19122] ? security_file_ioctl+0x93/0xc0 [ 418.839594][T19122] ksys_ioctl+0xab/0xd0 [ 418.843765][T19122] __x64_sys_ioctl+0x73/0xb0 [ 418.848376][T19122] do_syscall_64+0x103/0x610 [ 418.852991][T19122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.858888][T19122] RIP: 0033:0x458c29 [ 418.862784][T19122] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.882410][T19122] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 418.890828][T19122] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 [ 418.898802][T19122] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000003 [ 418.906773][T19122] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 04:42:54 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0a3e19319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:54 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x1000000, &(0x7f00000003c0)={0x0}}, 0x0) [ 418.914747][T19122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 418.922719][T19122] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 04:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000140)=0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:42:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x2, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) [ 419.111529][T19557] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 419.137320][T19557] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 419.171967][T19557] Error parsing options; rc = [-22] 04:42:57 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x4b49, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:42:57 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0xffffffffffffffff) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:42:57 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465c8e1673937ef6657d543722f73673000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x200000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000180)={0x3, r1}) 04:42:57 executing program 3 (fault-call:5 fault-nth:4): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:42:57 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x2000000, &(0x7f00000003c0)={0x0}}, 0x0) 04:42:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000180)={0x80000001, 0x5}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x109442) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[@timestamp], 0x1) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f00000001c0)={0x2d}) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000240)={0x10001, 0x94, 0x800}) clone(0xfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='\xca\xc7/\xb3\xa9\xf1\x8by\x16\vJ\xc2\xff\x16\x91\xc8\xc0\xd8&R\xe5\xd6)j\xdfq\x0e)\\\xefU\xffQ\"\x97\x7fu\xab\xe4\xd5\x962\xd7\xbb\x8dB\xd4', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') write$binfmt_aout(r2, &(0x7f0000000680)={{0x107, 0x1, 0x4, 0x366, 0x298, 0x2, 0x11e, 0x4}, "0423ac9f155b491bb03f0893d9fd24b5fa85fefc183454e5c546cb2168510bdcfe68c9c2f115de9484d689f74c9f9258a959c2e89eb73902224982ad5ec17f4dce7d25d96b75297d7677cfad886faac3bf544c625f4d7b88eacfac76f46ec0ba1951dbd01d30b0593e08451d84ddb7a35d36d7a9b3f316ce9ed2a241187a121975e8019371fd480c79960ee357189437dd0d5c535b9f6fcb6092d9359a81f5f62cabab2594d6d06e94edf4af1c637203afdb6582e3c082950daf568546e9c08dfc86de664162f945236b86f2ce2de0a2f15bbb873c3ef2581436215a5232770c1a502b54f0a6570ef9f7c819fd3a4d40a7759edc3c46238a6c", [[], [], [], [], [], [], [], []]}, 0x919) [ 421.983768][T19770] UBIFS error (pid: 19770): cannot open "/deÈág97ïfWÕCr/sg0", error -22 04:42:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x800000000050000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 421.985264][T19770] UBIFS error (pid: 19770): cannot open "/deÈág97ïfWÕCr/sg0", error -22 [ 422.031681][T19781] FAULT_INJECTION: forcing a failure. [ 422.031681][T19781] name failslab, interval 1, probability 0, space 0, times 0 04:42:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000000000006"]) ioctl$sock_ifreq(r0, 0x89f9, &(0x7f0000000180)={'sit0\x00', @ifru_flags=0x2}) [ 422.140064][T19904] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:42:57 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$NBD_SET_SIZE(r0, 0xab02, 0x7f) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') [ 422.195244][T19904] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 422.250313][T19904] Error parsing options; rc = [-22] [ 422.287815][T19781] CPU: 1 PID: 19781 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 422.295846][T19781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.305904][T19781] Call Trace: [ 422.309212][T19781] dump_stack+0x172/0x1f0 [ 422.309241][T19781] should_fail.cold+0xa/0x15 [ 422.309265][T19781] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 422.324003][T19781] ? ___might_sleep+0x163/0x280 [ 422.328871][T19781] __should_failslab+0x121/0x190 [ 422.333822][T19781] should_failslab+0x9/0x14 [ 422.338340][T19781] kmem_cache_alloc_node_trace+0x270/0x720 [ 422.344158][T19781] ? kasan_unpoison_shadow+0x35/0x50 [ 422.349472][T19781] __kmalloc_node+0x3d/0x70 [ 422.353995][T19781] kvmalloc_node+0x68/0x100 [ 422.358516][T19781] alloc_netdev_mqs+0x821/0xd30 [ 422.363478][T19781] ppp_ioctl+0x17c9/0x25f7 [ 422.367908][T19781] ? ppp_input_error+0x210/0x210 [ 422.372857][T19781] ? ___might_sleep+0x163/0x280 [ 422.377715][T19781] ? ppp_input_error+0x210/0x210 [ 422.382662][T19781] do_vfs_ioctl+0xd6e/0x1390 [ 422.387263][T19781] ? ioctl_preallocate+0x210/0x210 [ 422.392373][T19781] ? selinux_file_mprotect+0x620/0x620 [ 422.397839][T19781] ? __fget+0x381/0x550 [ 422.402008][T19781] ? ksys_dup3+0x3e0/0x3e0 [ 422.406440][T19781] ? tomoyo_file_ioctl+0x23/0x30 [ 422.411384][T19781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.417655][T19781] ? security_file_ioctl+0x93/0xc0 [ 422.422770][T19781] ksys_ioctl+0xab/0xd0 [ 422.426945][T19781] __x64_sys_ioctl+0x73/0xb0 [ 422.431546][T19781] do_syscall_64+0x103/0x610 [ 422.436141][T19781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.442035][T19781] RIP: 0033:0x458c29 [ 422.445930][T19781] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.465542][T19781] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 422.473968][T19781] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 04:42:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0xc0045878, 0x0) 04:42:58 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x6000000, &(0x7f00000003c0)={0x0}}, 0x0) [ 422.481940][T19781] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000003 [ 422.489910][T19781] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 422.497879][T19781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 422.505847][T19781] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 04:42:58 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_ifreq(r3, 0x893a, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_group_source_req(r3, 0x0, 0x8, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @broadcast}}, {{0x2, 0x0, @local}}}, 0x108) ioctl(r1, 0xffffffffffff2603, &(0x7f00000000c0)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:43:01 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x541b, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:43:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x1000000000800, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@ipx={0x4, 0x6, 0x7, "65c8f871604b", 0x81}, {&(0x7f0000000100)=""/21, 0x15}, &(0x7f0000000140), 0x8}, 0xa0) 04:43:01 executing program 3 (fault-call:5 fault-nth:5): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) 04:43:01 executing program 1: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0xc4e6, 0x101}) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='fs\x00\x00\x00\x00\x00', 0x0, &(0x7f0000000000)) 04:43:01 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) tkill(r2, 0x26) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'ip6_vti0\x00'}, 0x18) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '$%'}, {0x20, '^'}, {0x20, 'ip6_vti0\x00'}, {0x20, '/dev/vga_arbiter\x00'}, {0x20, '/dev/vga_arbiter\x00'}], 0xa, "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"}, 0x103e) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000000)={0x9, 0x7, 0x4, 0x80, 0x80000000, 0x7f, 0x9}) ioctl(r1, 0x1000008812, &(0x7f0000000280)="0a0700000000000000d070") gettid() fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000100)) 04:43:01 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0xc000000, &(0x7f00000003c0)={0x0}}, 0x0) [ 425.605229][T20419] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:43:01 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x7, 0x4) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc, 0x12, r1, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r1, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000000c0)) [ 425.642597][T20419] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 425.663287][T20446] FAULT_INJECTION: forcing a failure. [ 425.663287][T20446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.676791][T20446] CPU: 1 PID: 20446 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 425.684781][T20446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.694846][T20446] Call Trace: [ 425.694912][T20446] dump_stack+0x172/0x1f0 [ 425.694940][T20446] should_fail.cold+0xa/0x15 [ 425.707133][T20446] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 425.712949][T20446] ? __lock_acquire+0x548/0x3fb0 [ 425.717893][T20446] ? __lock_acquire+0x548/0x3fb0 [ 425.722849][T20446] should_fail_alloc_page+0x50/0x60 [ 425.728054][T20446] __alloc_pages_nodemask+0x1a1/0x7e0 [ 425.733444][T20446] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 425.739192][T20446] ? find_held_lock+0x35/0x130 [ 425.744072][T20446] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 425.749931][T20446] cache_grow_begin+0x9c/0x860 [ 425.754708][T20446] ? radix_tree_node_alloc.constprop.0+0x82/0x340 [ 425.761130][T20446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.767395][T20446] kmem_cache_alloc+0x62d/0x6f0 [ 425.772268][T20446] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 425.778523][T20446] idr_get_free+0x474/0x890 [ 425.783053][T20446] idr_alloc_u32+0x19e/0x330 [ 425.787657][T20446] ? __fprop_inc_percpu_max+0x230/0x230 [ 425.793220][T20446] ? mutex_trylock+0x1e0/0x1e0 [ 425.797997][T20446] ? find_held_lock+0x35/0x130 [ 425.802784][T20446] idr_alloc+0xe5/0x150 [ 425.806955][T20446] ? idr_alloc_u32+0x330/0x330 [ 425.811781][T20446] ? radix_tree_lookup+0x22/0x30 [ 425.816728][T20446] ppp_dev_configure+0xa49/0xcf0 [ 425.821690][T20446] ppp_ioctl+0x1848/0x25f7 [ 425.826124][T20446] ? ppp_input_error+0x210/0x210 [ 425.831076][T20446] ? ___might_sleep+0x163/0x280 [ 425.835950][T20446] ? ppp_input_error+0x210/0x210 [ 425.840906][T20446] do_vfs_ioctl+0xd6e/0x1390 [ 425.844589][T20419] Error parsing options; rc = [-22] [ 425.845512][T20446] ? ioctl_preallocate+0x210/0x210 [ 425.845529][T20446] ? selinux_file_mprotect+0x620/0x620 [ 425.845544][T20446] ? __fget+0x381/0x550 [ 425.845571][T20446] ? ksys_dup3+0x3e0/0x3e0 [ 425.869872][T20446] ? tomoyo_file_ioctl+0x23/0x30 [ 425.874823][T20446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.881068][T20446] ? security_file_ioctl+0x93/0xc0 [ 425.886203][T20446] ksys_ioctl+0xab/0xd0 [ 425.890369][T20446] __x64_sys_ioctl+0x73/0xb0 [ 425.894982][T20446] do_syscall_64+0x103/0x610 [ 425.899588][T20446] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:43:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00\x87Q\xb9\xf9\xc4\xf9\x86G\xcd\xaa\x95sA\xf1\xd73_\xbf@m\x1c0`K]\xac\x84Ic') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 425.905486][T20446] RIP: 0033:0x458c29 [ 425.909382][T20446] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.928983][T20446] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.928999][T20446] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 [ 425.929008][T20446] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000003 04:43:01 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f00000001c0)={&(0x7f0000ffd000/0x1000)=nil, 0xfffffffffffffff7, 0x5, 0x40, &(0x7f0000ffd000/0x2000)=nil, 0x3}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000100)="b9fed0f00beea7ea67a1cbba701da1507fabf821bad8a9ebdcaad263715cd02748a7534f0ca6a80b5021a08d90f6269c4ec67f0289654be02ed27a817e41a9b510b4c7447f43b72928dd22e7407f0b2e61fd1c", 0x53, 0x800, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') [ 425.929016][T20446] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 425.929033][T20446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 425.969283][T20446] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 04:43:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 426.105324][T20735] QAT: Invalid ioctl 04:43:01 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x1) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000040)='cgroup\x00', &(0x7f0000000080)='^-wlan1\x00', &(0x7f00000000c0)='-\x00', &(0x7f0000000100)='md5sum\x00', &(0x7f0000000140)='!em0-ppp0$\x00', &(0x7f0000000180)='vboxnet0}\x00'], &(0x7f0000000240)=[&(0x7f0000000200)='vmnet1wlan0&bdev\x00']) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') 04:43:01 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x12000000, &(0x7f00000003c0)={0x0}}, 0x0) [ 426.142225][T20735] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 426.171234][T20735] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 426.217329][T20735] Error parsing options; rc = [-22] 04:43:04 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EVIOCSABS2F(r0, 0x5421, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 04:43:04 executing program 0: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)="24000000200007041dfffd946f610500020000031f00034000000800080013000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/138, 0x8a}, {&(0x7f0000000100)=""/131, 0x83}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/217, 0xd9}, {&(0x7f0000001540)=""/213, 0xd5}, {&(0x7f00000001c0)=""/176, 0xb0}], 0x6) 04:43:04 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x39260000, &(0x7f00000003c0)={0x0}}, 0x0) 04:43:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0xb8, 0x9ec}]}, 0xc, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 04:43:04 executing program 1: syz_execute_func(&(0x7f0000000440)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 04:43:04 executing program 3 (fault-call:5 fault-nth:6): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r1, &(0x7f0000000300)="20d5", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) [ 429.256444][T21068] Unknown ioctl 19586 [ 429.270573][T21078] netlink: 'syz-executor.0': attribute type 19 has an invalid length. [ 429.295678][T21068] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 04:43:05 executing program 1: socket(0x0, 0x0, 0x0) stat(0x0, 0x0) r0 = gettid() ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod$loop(0x0, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 429.331009][T21078] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 429.338965][T21068] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 429.400234][T21068] Error parsing options; rc = [-22] 04:43:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xaef, 0x1) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x6c, r2, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0xb3fa, 0x100000000]}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_SECRET={0xc, 0x4, [0xfffffffffffffc00, 0x8d93]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7fff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x880) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') 04:43:05 executing program 1: gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) sendmsg$netlink(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0}, 0x0) 04:43:05 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x9) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000480)={0x0, 0x3f000000, &(0x7f00000003c0)={0x0}}, 0x0) 04:43:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, 0x0, 0x0) 04:43:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") personality(0x0) [ 430.052189][T21084] FAULT_INJECTION: forcing a failure. [ 430.052189][T21084] name failslab, interval 1, probability 0, space 0, times 0 [ 430.105366][T21084] CPU: 1 PID: 21084 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 430.113407][T21084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.123475][T21084] Call Trace: [ 430.126789][T21084] dump_stack+0x172/0x1f0 [ 430.131138][T21084] should_fail.cold+0xa/0x15 [ 430.136276][T21084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 430.142100][T21084] ? ___might_sleep+0x163/0x280 [ 430.146972][T21084] __should_failslab+0x121/0x190 [ 430.151913][T21084] should_failslab+0x9/0x14 [ 430.156440][T21084] kmem_cache_alloc_trace+0x2d1/0x760 [ 430.161829][T21084] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 430.168076][T21084] ? refcount_inc_checked+0x2b/0x70 [ 430.173289][T21084] device_add+0xfdc/0x18a0 [ 430.177727][T21084] ? device_initialize+0x440/0x440 [ 430.182850][T21084] ? get_device_parent.isra.0+0x570/0x570 [ 430.188580][T21084] ? __init_waitqueue_head+0x36/0x90 [ 430.193979][T21084] ? pm_runtime_init+0x311/0x3b0 [ 430.198975][T21084] netdev_register_kobject+0x183/0x3c0 [ 430.204466][T21084] register_netdevice+0x878/0xff0 [ 430.209517][T21084] ? netdev_change_features+0xb0/0xb0 [ 430.214918][T21084] ppp_dev_configure+0x98e/0xcf0 [ 430.219871][T21084] ppp_ioctl+0x1848/0x25f7 [ 430.224304][T21084] ? ppp_input_error+0x210/0x210 [ 430.229250][T21084] ? ___might_sleep+0x163/0x280 [ 430.234113][T21084] ? ppp_input_error+0x210/0x210 [ 430.239068][T21084] do_vfs_ioctl+0xd6e/0x1390 [ 430.243684][T21084] ? ioctl_preallocate+0x210/0x210 [ 430.248811][T21084] ? selinux_file_mprotect+0x620/0x620 [ 430.254280][T21084] ? __fget+0x381/0x550 [ 430.259085][T21084] ? ksys_dup3+0x3e0/0x3e0 [ 430.263520][T21084] ? tomoyo_file_ioctl+0x23/0x30 [ 430.268475][T21084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.274730][T21084] ? security_file_ioctl+0x93/0xc0 [ 430.279853][T21084] ksys_ioctl+0xab/0xd0 [ 430.284020][T21084] __x64_sys_ioctl+0x73/0xb0 [ 430.288619][T21084] do_syscall_64+0x103/0x610 [ 430.293221][T21084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.299121][T21084] RIP: 0033:0x458c29 [ 430.303037][T21084] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.322650][T21084] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 430.331078][T21084] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 [ 430.339060][T21084] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000003 [ 430.347038][T21084] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 430.355014][T21084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 430.363022][T21084] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 [ 430.393453][T21084] ------------[ cut here ]------------ [ 430.398963][T21084] kernel BUG at net/core/net-sysfs.c:1631! [ 430.416134][T21084] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 430.422241][T21084] CPU: 1 PID: 21084 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #71 [ 430.430211][T21084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.440293][T21084] RIP: 0010:netdev_release+0x92/0xb0 [ 430.445591][T21084] Code: 48 c1 ea 03 80 3c 02 00 75 29 48 8b bb 80 fa ff ff e8 72 af 21 fc 4c 89 ef e8 9a c2 f5 ff 5b 41 5c 41 5d 5d c3 e8 4e da e9 fb <0f> 0b e8 97 e9 21 fc eb 9c e8 f0 e9 21 fc eb d0 0f 1f 40 00 66 2e [ 430.465204][T21084] RSP: 0018:ffff88804da1f9f0 EFLAGS: 00010246 [ 430.471271][T21084] RAX: 0000000000040000 RBX: ffff8880a8422f20 RCX: ffffc9000c6bb000 [ 430.479239][T21084] RDX: 0000000000040000 RSI: ffffffff8586b262 RDI: 0000000000000001 [ 430.487223][T21084] RBP: ffff88804da1fa08 R08: ffff8880a51a0540 R09: ffff8880a51a0e08 [ 430.495195][T21084] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 430.503193][T21084] R13: ffff8880a8422980 R14: 0000000000000000 R15: 0000000000000000 [ 430.511179][T21084] FS: 00007fb3ddc53700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 430.520103][T21084] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 430.526679][T21084] CR2: 00000000009d80b8 CR3: 00000000a5baf000 CR4: 00000000001406e0 [ 430.534646][T21084] Call Trace: [ 430.537946][T21084] ? xps_cpus_store+0x2b0/0x2b0 [ 430.542803][T21084] device_release+0x7d/0x210 [ 430.547409][T21084] kobject_put.cold+0x28f/0x2ec [ 430.552274][T21084] put_device+0x20/0x30 [ 430.556445][T21084] netdev_register_kobject+0x1a1/0x3c0 [ 430.561909][T21084] register_netdevice+0x878/0xff0 [ 430.566945][T21084] ? netdev_change_features+0xb0/0xb0 [ 430.572364][T21084] ppp_dev_configure+0x98e/0xcf0 [ 430.577320][T21084] ppp_ioctl+0x1848/0x25f7 [ 430.581741][T21084] ? ppp_input_error+0x210/0x210 [ 430.586693][T21084] ? ___might_sleep+0x163/0x280 [ 430.591572][T21084] ? ppp_input_error+0x210/0x210 [ 430.596550][T21084] do_vfs_ioctl+0xd6e/0x1390 [ 430.601158][T21084] ? ioctl_preallocate+0x210/0x210 [ 430.606279][T21084] ? selinux_file_mprotect+0x620/0x620 [ 430.611744][T21084] ? __fget+0x381/0x550 [ 430.615915][T21084] ? ksys_dup3+0x3e0/0x3e0 [ 430.620341][T21084] ? tomoyo_file_ioctl+0x23/0x30 [ 430.625300][T21084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.631546][T21084] ? security_file_ioctl+0x93/0xc0 [ 430.636674][T21084] ksys_ioctl+0xab/0xd0 [ 430.640844][T21084] __x64_sys_ioctl+0x73/0xb0 [ 430.645442][T21084] do_syscall_64+0x103/0x610 [ 430.650137][T21084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.656035][T21084] RIP: 0033:0x458c29 [ 430.659933][T21084] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.679548][T21084] RSP: 002b:00007fb3ddc52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 430.687963][T21084] RAX: ffffffffffffffda RBX: 00007fb3ddc52c90 RCX: 0000000000458c29 [ 430.695935][T21084] RDX: 00000000200002c0 RSI: 00000000c004743e RDI: 0000000000000003 [ 430.704138][T21084] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 430.712377][T21084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3ddc536d4 [ 430.720502][T21084] R13: 00000000004c0c79 R14: 00000000004d31a0 R15: 0000000000000005 [ 430.728487][T21084] Modules linked in: [ 430.738777][T21084] ---[ end trace dabc550690e5ad3a ]--- [ 430.744270][T21084] RIP: 0010:netdev_release+0x92/0xb0 [ 430.752129][T21084] Code: 48 c1 ea 03 80 3c 02 00 75 29 48 8b bb 80 fa ff ff e8 72 af 21 fc 4c 89 ef e8 9a c2 f5 ff 5b 41 5c 41 5d 5d c3 e8 4e da e9 fb <0f> 0b e8 97 e9 21 fc eb 9c e8 f0 e9 21 fc eb d0 0f 1f 40 00 66 2e [ 430.775315][T21084] RSP: 0018:ffff88804da1f9f0 EFLAGS: 00010246 [ 430.781721][T21084] RAX: 0000000000040000 RBX: ffff8880a8422f20 RCX: ffffc9000c6bb000 [ 430.792625][T21084] RDX: 0000000000040000 RSI: ffffffff8586b262 RDI: 0000000000000001 [ 430.801602][T21084] RBP: ffff88804da1fa08 R08: ffff8880a51a0540 R09: ffff8880a51a0e08 [ 430.812364][T21084] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 430.821151][T21084] R13: ffff8880a8422980 R14: 0000000000000000 R15: 0000000000000000 [ 430.831874][T21084] FS: 00007fb3ddc53700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 430.841090][T21084] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 430.851719][T21084] CR2: 00000000009d80b8 CR3: 00000000a5baf000 CR4: 00000000001406e0 [ 430.859971][T21084] Kernel panic - not syncing: Fatal exception [ 430.866743][T21084] Kernel Offset: disabled [ 430.871092][T21084] Rebooting in 86400 seconds..