0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000004c0), 0x2, 0x38d082) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000280)=@default_ibss_ssid, 0x6, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000008c0)={0x7, &(0x7f0000000880)=[{0x81, 0x3f, 0x6, 0x1000}, {0x1, 0x8, 0x20, 0x5ca}, {0xb289, 0x3f, 0x0, 0x2}, {0x5, 0x1, 0xb8, 0x3}, {0xe7c, 0x6, 0x4, 0x2}, {0x401, 0x7, 0x1, 0x1000}, {0x8, 0x6, 0x8, 0x7837}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)={0x184, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x184}, 0x1, 0x0, 0x0, 0x20004081}, 0x811) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000400)="848a97e260ff6d653fb73630f1eb62536d1d015f74ccd17bdc354719c4727419c0e09da39c09ac239e966b7660d5364c838f8d73f5d00039581d76bec7b08eb57f33d5817d3f45558f035024be9001ed9c507a9386576d3431cf8a229d463fe4139f3ac54cf30d0128f8c3abc821b20b62fd8631431462b5dac9051b729b7c0a4057a7063fac87252fbb9d9e8dada364c7cfbfd4c5df25b4283430aef4ce1343d80b16e9a01193c96520fd87c219d1d9749818c2e1ac68b4", 0xb8}, {&(0x7f0000000740)="3ad53687bd45562610827409a7ab49ceb20a7ec26976944ac2d4140f90f572bec33e4370cb6346ddb12a13601d7d41029784fff0bee48e571082296e101ec96229feaea953635918b4202ad12e0ca5935f335a456658e7ebf48aa4154119ae1b692cfda96e3fccca143528bc1c1842cde80e93f3cc415083e589738b0e04362fdd907cd465e4da8f7a4ce26e528479b7a94b88f6738ceaae46d55d26e933d473573cacd7b8720db6f5bf7c165abbf590cdb7a28c5a90d3477e9a25712dd6", 0xbe}, {&(0x7f00000002c0)="d9bd76eaeb2279072403b8958ce414a6bbc86f20642f", 0x16}, {&(0x7f0000000800)="78e3350079b7f7254c9fa3cf8bc28e", 0xf}], 0x4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x0, 0x9}, 0x28, 0x101, 0xf, 0x0, 0x0, 0x7ef, 0x40, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}]}, 0x31}}, 0x0) [ 861.943720] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 862.025340] attempt to access beyond end of device [ 862.056341] loop2: rw=12288, want=8200, limit=12 [ 862.090785] attempt to access beyond end of device [ 862.136565] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 862.136754] loop2: rw=12288, want=12296, limit=12 [ 862.172423] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 862.218647] audit: type=1326 audit(1646721028.887:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb029768049 code=0x7ffc0000 [ 862.230866] f2fs_msg: 119 callbacks suppressed [ 862.230874] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 862.328743] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 862.339038] audit: type=1326 audit(1646721028.887:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb029768049 code=0x7ffc0000 [ 862.397248] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 862.420551] F2FS-fs (loop2): Test dummy encryption mount option ignored [ 862.443667] attempt to access beyond end of device [ 862.457750] audit: type=1326 audit(1646721028.897:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb0297696c7 code=0x7ffc0000 [ 862.490966] loop2: rw=12288, want=8200, limit=12 06:30:29 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0xe1000009, 0x0) fstat(r0, &(0x7f0000000000)) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MTU={0x8, 0x3a}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 06:30:29 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0x100) dup3(r0, r1, 0x0) sendmmsg(r1, &(0x7f0000000200)=[{{&(0x7f0000000180)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000080)='A', 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='B\x00'/16], 0x10}}], 0x2, 0x0) socket$inet(0x2, 0x4000000805, 0x0) (async) socket$inet_sctp(0x2, 0x1, 0x84) (async) listen(r0, 0x100) (async) dup3(r0, r1, 0x0) (async) sendmmsg(r1, &(0x7f0000000200)=[{{&(0x7f0000000180)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000080)='A', 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='B\x00'/16], 0x10}}], 0x2, 0x0) (async) 06:30:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[], 0xc000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x2) socket$kcm(0xa, 0x2, 0x73) r2 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xf1, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x40, 0xd8, 0x3f, 0x89, 0x0, 0x0, 0x1804, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000640)}, 0x2, 0x2, 0x5, 0x2, 0xfce4, 0xfffffffb, 0x0, 0x0, 0x10000, 0x0, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000f40)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614dcc6fabec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669ffa4aaca0f9d9924be41a9169bdfaf16d1c0b15390bb8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f91f5d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494da484ebad0407d9440b69ad9f19ab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d41a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed564c0a2fcb6da006b5d0fe4886a9edee77f6986319f85dd06a24c37e588959f34d2c5f649b85e5b0baada5f1aad49da960f10ddd86e2d1638f90b79c7f8526a13702d613dc88670f3478182136c74d163716ba8219392d65582b33e7dfd27e69d71a19da16f2c3e683176d47c2599d03008c05c8c15edd1ef5cc236934ac483b8bf80794ecb7ac00ce453c14d29dab6dcf1855a1ab3d7c2ee8d43e479f3a17a4ac213bfa477f41a41564aac25192cb10e4e4dfc5cfbdef1d4cea17286ec8f6db16dc62b8ca086734223cf718c6bb21eae7eca3cb1baa3105a33cfc2cd90adf3720d13cd114695fea0cd01735a16d3c4e101ac6713c630445402b021d7748f049b44631062d465506ceecc604720e0e7bf4d16947c78fd2bb24c288d719712d529d9d0ba7b0db4cca204c6fae33f60c01559eafbed82203bf45781e3681c0ec1d041e18dde1ae9033946a7acf61d1c3bd1c988aabea18a402a93e156bcf4a4043bfe7575a977b0e0a76647f949edd8e86b58702e5edc98405db78242b542ab94182db71a0d5a0354ceb4399aa35ecfed552652f93f621bfeb4d355a92403fed0000000000e699bf10f0ed955a771fee639f0533bd40b2ed03caaf81e4265bf4b3649ec96e850cb9c4fa75fe50d266dde7a22e8b9e4f68731704743bd6592362506a64b90a89dbeea61bb480cafd4d557c1b1b23aff85096a53ac3d3bf0b3e647d8e15afeecaca6536de1fe99b3415234e01fff773cdb8ca7bea113ac2ae22054075fecb6947caf2bccab388e4036f157eae1b81b53481bb2a8f7cf0e929a91c2ecbfc17579256b9bc23fb6e3aa7e678cc70d9"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, r2, 0x0, 0x37, 0x0}, 0x24) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x20759000) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000140)=0x37, 0x12) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2000c0, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x701000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) socket$kcm(0x2b, 0x1, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) close(r0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[], 0xc000) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x2) (async) socket$kcm(0xa, 0x2, 0x73) (async) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xf1, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) (async) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x40, 0xd8, 0x3f, 0x89, 0x0, 0x0, 0x1804, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000640)}, 0x2, 0x2, 0x5, 0x2, 0xfce4, 0xfffffffb, 0x0, 0x0, 0x10000, 0x0, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) gettid() (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, r2, 0x0, 0x37, 0x0}, 0x24) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x20759000) (async) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) (async) write$cgroup_int(r5, &(0x7f0000000140)=0x37, 0x12) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2000c0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x701000, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) (async) [ 862.507795] attempt to access beyond end of device 06:30:29 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000001c0)={0x0, 0x1, 0x1ff, {0x0, 0x3ff}, {0xf171, 0x1}, @rumble={0x9, 0x8}}) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 64) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_open_dev$evdev(&(0x7f00000004c0), 0x2, 0x38d082) (async, rerun: 64) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000280)=@default_ibss_ssid, 0x6, 0x0) (async, rerun: 64) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000008c0)={0x7, &(0x7f0000000880)=[{0x81, 0x3f, 0x6, 0x1000}, {0x1, 0x8, 0x20, 0x5ca}, {0xb289, 0x3f, 0x0, 0x2}, {0x5, 0x1, 0xb8, 0x3}, {0xe7c, 0x6, 0x4, 0x2}, {0x401, 0x7, 0x1, 0x1000}, {0x8, 0x6, 0x8, 0x7837}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)={0x184, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x184}, 0x1, 0x0, 0x0, 0x20004081}, 0x811) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000400)="848a97e260ff6d653fb73630f1eb62536d1d015f74ccd17bdc354719c4727419c0e09da39c09ac239e966b7660d5364c838f8d73f5d00039581d76bec7b08eb57f33d5817d3f45558f035024be9001ed9c507a9386576d3431cf8a229d463fe4139f3ac54cf30d0128f8c3abc821b20b62fd8631431462b5dac9051b729b7c0a4057a7063fac87252fbb9d9e8dada364c7cfbfd4c5df25b4283430aef4ce1343d80b16e9a01193c96520fd87c219d1d9749818c2e1ac68b4", 0xb8}, {&(0x7f0000000740)="3ad53687bd45562610827409a7ab49ceb20a7ec26976944ac2d4140f90f572bec33e4370cb6346ddb12a13601d7d41029784fff0bee48e571082296e101ec96229feaea953635918b4202ad12e0ca5935f335a456658e7ebf48aa4154119ae1b692cfda96e3fccca143528bc1c1842cde80e93f3cc415083e589738b0e04362fdd907cd465e4da8f7a4ce26e528479b7a94b88f6738ceaae46d55d26e933d473573cacd7b8720db6f5bf7c165abbf590cdb7a28c5a90d3477e9a25712dd6", 0xbe}, {&(0x7f00000002c0)="d9bd76eaeb2279072403b8958ce414a6bbc86f20642f", 0x16}, {&(0x7f0000000800)="78e3350079b7f7254c9fa3cf8bc28e", 0xf}], 0x4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x0, 0x9}, 0x28, 0x101, 0xf, 0x0, 0x0, 0x7ef, 0x40, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}]}, 0x31}}, 0x0) [ 862.538334] audit: type=1326 audit(1646721028.897:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7fb02971ae0c code=0x7ffc0000 [ 862.563928] audit: type=1326 audit(1646721028.897:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fb02971ad44 code=0x7ffc0000 [ 862.586060] loop2: rw=12288, want=12296, limit=12 [ 862.586316] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 06:30:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000030000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 862.678887] audit: type=1326 audit(1646721028.927:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fb02971ad44 code=0x7ffc0000 [ 862.709287] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 06:30:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x54}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vxcan1\x00'}) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x1a1, 0x0) 06:30:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(r0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[], 0xc000) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x2) (async, rerun: 64) socket$kcm(0xa, 0x2, 0x73) (async, rerun: 64) r2 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xf1, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x40, 0xd8, 0x3f, 0x89, 0x0, 0x0, 0x1804, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000640)}, 0x2, 0x2, 0x5, 0x2, 0xfce4, 0xfffffffb, 0x0, 0x0, 0x10000, 0x0, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, r2, 0x0, 0x37, 0x0}, 0x24) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x541b, 0x20759000) (async) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000140)=0x37, 0x12) (async) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2000c0, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x701000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) [ 862.746616] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 862.779377] F2FS-fs (loop2): Unable to read 2th superblock [ 862.781344] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:30:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x1, 0xb, 0x0, 0x18}], &(0x7f0000000140)='GPL\x00', 0x2, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x1, 0x9}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vlan1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000180)=""/191, 0x29, 0xbf, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={r7, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x0, 0xd, 0x1, 0xa, 0x30, 0x4}, @alu={0x4, 0x0, 0x6, 0x9, 0x7, 0x30, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0xd3e, 0x42, &(0x7f00000002c0)=""/66, 0x41100, 0x4, '\x00', 0x0, 0xa, r6, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xf, 0x1ff, 0x6}, 0x10, r8}, 0x78) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='sessionid\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x3, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f00000003c0)='syzkaller\x00', 0x400, 0x52, &(0x7f0000000400)=""/82, 0x41100, 0x2, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x4, 0x101, 0x8}, 0x10, r8, r9, 0x0, &(0x7f0000000540)=[r2, 0xffffffffffffffff]}, 0x80) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x49c}, [@IFLA_LINKMODE={0x5, 0x11, 0x9}]}, 0x28}}, 0x0) [ 862.812987] F2FS-fs (loop2): Test dummy encryption mount option ignored [ 862.844947] audit: type=1326 audit(1646721028.927:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb0297696c7 code=0x7ffc0000 [ 862.848798] attempt to access beyond end of device [ 862.891932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 862.938670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 862.941201] loop2: rw=12288, want=8200, limit=12 [ 862.972339] attempt to access beyond end of device 06:30:29 executing program 5: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000240)="cefaad1b9cf4636420b43b8e", 0xc, 0x4}, {0x0, 0x0, 0xd4c5}], 0x0, &(0x7f0000010300)) [ 862.983020] audit: type=1326 audit(1646721028.927:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb029767e07 code=0x7ffc0000 [ 862.985329] loop2: rw=12288, want=12296, limit=12 [ 863.013011] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 863.021733] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 863.031142] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 863.053834] attempt to access beyond end of device [ 863.061496] loop2: rw=12288, want=8200, limit=12 [ 863.067431] attempt to access beyond end of device [ 863.076470] Bluetooth: hci6: command 0x0406 tx timeout 06:30:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x1, 0xb, 0x0, 0x18}], &(0x7f0000000140)='GPL\x00', 0x2, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x1, 0x9}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vlan1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000180)=""/191, 0x29, 0xbf, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={r7, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x0, 0xd, 0x1, 0xa, 0x30, 0x4}, @alu={0x4, 0x0, 0x6, 0x9, 0x7, 0x30, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0xd3e, 0x42, &(0x7f00000002c0)=""/66, 0x41100, 0x4, '\x00', 0x0, 0xa, r6, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xf, 0x1ff, 0x6}, 0x10, r8}, 0x78) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='sessionid\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x3, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f00000003c0)='syzkaller\x00', 0x400, 0x52, &(0x7f0000000400)=""/82, 0x41100, 0x2, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x4, 0x101, 0x8}, 0x10, r8, r9, 0x0, &(0x7f0000000540)=[r2, 0xffffffffffffffff]}, 0x80) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x49c}, [@IFLA_LINKMODE={0x5, 0x11, 0x9}]}, 0x28}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x1, 0xb, 0x0, 0x18}], &(0x7f0000000140)='GPL\x00', 0x2, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x1, 0x9}, 0x10}, 0x80) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vlan1\x00'}) (async) socket$netlink(0x10, 0x3, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) (async) socket(0x10, 0x80002, 0x0) (async) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000180)=""/191, 0x29, 0xbf, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={r7, 0x10, &(0x7f0000001680)={0x0}}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r8, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x0, 0xd, 0x1, 0xa, 0x30, 0x4}, @alu={0x4, 0x0, 0x6, 0x9, 0x7, 0x30, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0xd3e, 0x42, &(0x7f00000002c0)=""/66, 0x41100, 0x4, '\x00', 0x0, 0xa, r6, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xf, 0x1ff, 0x6}, 0x10, r8}, 0x78) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='sessionid\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x3, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f00000003c0)='syzkaller\x00', 0x400, 0x52, &(0x7f0000000400)=""/82, 0x41100, 0x2, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x4, 0x101, 0x8}, 0x10, r8, r9, 0x0, &(0x7f0000000540)=[r2, 0xffffffffffffffff]}, 0x80) (async) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x49c}, [@IFLA_LINKMODE={0x5, 0x11, 0x9}]}, 0x28}}, 0x0) (async) [ 863.082527] audit: type=1326 audit(1646721028.927:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fb0297679e7 code=0x7ffc0000 [ 863.106085] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 863.107087] audit: type=1326 audit(1646721028.927:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7fb02971ae0c code=0x7ffc0000 06:30:29 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0xb1}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = socket$inet6(0xa, 0x4, 0x8dd) sendto$inet6(r3, &(0x7f0000000140)="3c2feb327f35698735b7b974fd54b3c32a9f272b5793449c19ea9a06a593055f6e6265e817e7abdbb436293c5383693b0e54e5b2e1ceaad8db49c425fbfc531f2f297aeae68560fa0f1587a77e1a406fc9ac23bdbbce32b656b6df40e7d6def7740a56045ec2ef81874f230ffc2f7a41704fcc2e80c0cffe561db6db7a18842a752b9b2ba3d61bdace0c7d95c1bff88fe6c103bd4e4b2df4694246bc61f578dbb6cd42038860f5c412", 0xa9, 0x4000, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000)="571ded48857e56e7f2d79851a44b10a3b62e03005167140e955498af6013ab04d7bb1adc60d67b835a43fdaa0a7d89f8f3d303c52fe203210ddcd8eb71c24a20dc7a81a4fbc83bdce4c9796eb6faf436e7bb83a5a72ed7d2a7e976351bddff63f23936cf419dabf321b251f6d621586c8502e6cefa6cc506569e15dbab9cac08f1e347ee4a85e0fecddc1261970a31e822bea16c39c5b188129cec87d0886b7b517a2fae1a9c9cea9428bf17f93b9045c80e35ced7ba7d2633e236ebbe173d3095e6cbd0ef02b339533853ceb830c4d078823aa9116277c1b3966147c267ffb2aeac4397d729f13469c6fc7ab7b44ca60195aa88fab58789", 0xf8, 0x40, &(0x7f0000000100)={0xa, 0x4e24, 0xea, @private2={0xfc, 0x2, '\x00', 0x1}, 0x30c63c1b}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9498, 0xf0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 863.138155] audit: type=1326 audit(1646721029.177:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fb02971ad44 code=0x7ffc0000 [ 863.162961] audit: type=1326 audit(1646721029.177:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb0297696c7 code=0x7ffc0000 [ 863.166630] loop2: rw=12288, want=12296, limit=12 06:30:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x54}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vxcan1\x00'}) (async) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x1a1, 0x0) [ 863.191160] audit: type=1326 audit(1646721029.177:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30526 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb029767e07 code=0x7ffc0000 06:30:29 executing program 5: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000240)="cefaad1b9cf4636420b43b8e", 0xc, 0x4}, {0x0, 0x0, 0xd4c5}], 0x0, &(0x7f0000010300)) syz_mount_image$bfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000240)="cefaad1b9cf4636420b43b8e", 0xc, 0x4}, {0x0, 0x0, 0xd4c5}], 0x0, &(0x7f0000010300)) (async) 06:30:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x1, 0xb, 0x0, 0x18}], &(0x7f0000000140)='GPL\x00', 0x2, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x1, 0x9}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vlan1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000180)=""/191, 0x29, 0xbf, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={r7, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x0, 0xd, 0x1, 0xa, 0x30, 0x4}, @alu={0x4, 0x0, 0x6, 0x9, 0x7, 0x30, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0xd3e, 0x42, &(0x7f00000002c0)=""/66, 0x41100, 0x4, '\x00', 0x0, 0xa, r6, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xf, 0x1ff, 0x6}, 0x10, r8}, 0x78) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='sessionid\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x3, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f00000003c0)='syzkaller\x00', 0x400, 0x52, &(0x7f0000000400)=""/82, 0x41100, 0x2, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x4, 0x101, 0x8}, 0x10, r8, r9, 0x0, &(0x7f0000000540)=[r2, 0xffffffffffffffff]}, 0x80) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x49c}, [@IFLA_LINKMODE={0x5, 0x11, 0x9}]}, 0x28}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x1, 0x1, 0xb, 0x0, 0x18}], &(0x7f0000000140)='GPL\x00', 0x2, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x1, 0x9}, 0x10}, 0x80) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vlan1\x00'}) (async) socket$netlink(0x10, 0x3, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) (async) socket(0x10, 0x80002, 0x0) (async) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000180)=""/191, 0x29, 0xbf, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={r7, 0x10, &(0x7f0000001680)={0x0}}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r8, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x0, 0xd, 0x1, 0xa, 0x30, 0x4}, @alu={0x4, 0x0, 0x6, 0x9, 0x7, 0x30, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0xd3e, 0x42, &(0x7f00000002c0)=""/66, 0x41100, 0x4, '\x00', 0x0, 0xa, r6, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xf, 0x1ff, 0x6}, 0x10, r8}, 0x78) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='sessionid\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x3, &(0x7f0000000380)=@raw=[@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f00000003c0)='syzkaller\x00', 0x400, 0x52, &(0x7f0000000400)=""/82, 0x41100, 0x2, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x4, 0x101, 0x8}, 0x10, r8, r9, 0x0, &(0x7f0000000540)=[r2, 0xffffffffffffffff]}, 0x80) (async) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x49c}, [@IFLA_LINKMODE={0x5, 0x11, 0x9}]}, 0x28}}, 0x0) (async) 06:30:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000040000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 863.402632] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 06:30:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005540), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x54}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vxcan1\x00'}) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x1a1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000005540), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) (async) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r1, 0xc09, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x4a}, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'syzkaller0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x54}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vxcan1\x00'}) (async) sendmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x1a1, 0x0) (async) 06:30:30 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000001c0)={0x0, 0x1, 0x1ff, {0x0, 0x3ff}, {0xf171, 0x1}, @rumble={0x9, 0x8}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00000004c0), 0x2, 0x38d082) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000280)=@default_ibss_ssid, 0x6, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000008c0)={0x7, &(0x7f0000000880)=[{0x81, 0x3f, 0x6, 0x1000}, {0x1, 0x8, 0x20, 0x5ca}, {0xb289, 0x3f, 0x0, 0x2}, {0x5, 0x1, 0xb8, 0x3}, {0xe7c, 0x6, 0x4, 0x2}, {0x401, 0x7, 0x1, 0x1000}, {0x8, 0x6, 0x8, 0x7837}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)={0x184, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x184}, 0x1, 0x0, 0x0, 0x20004081}, 0x811) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000400)="848a97e260ff6d653fb73630f1eb62536d1d015f74ccd17bdc354719c4727419c0e09da39c09ac239e966b7660d5364c838f8d73f5d00039581d76bec7b08eb57f33d5817d3f45558f035024be9001ed9c507a9386576d3431cf8a229d463fe4139f3ac54cf30d0128f8c3abc821b20b62fd8631431462b5dac9051b729b7c0a4057a7063fac87252fbb9d9e8dada364c7cfbfd4c5df25b4283430aef4ce1343d80b16e9a01193c96520fd87c219d1d9749818c2e1ac68b4", 0xb8}, {&(0x7f0000000740)="3ad53687bd45562610827409a7ab49ceb20a7ec26976944ac2d4140f90f572bec33e4370cb6346ddb12a13601d7d41029784fff0bee48e571082296e101ec96229feaea953635918b4202ad12e0ca5935f335a456658e7ebf48aa4154119ae1b692cfda96e3fccca143528bc1c1842cde80e93f3cc415083e589738b0e04362fdd907cd465e4da8f7a4ce26e528479b7a94b88f6738ceaae46d55d26e933d473573cacd7b8720db6f5bf7c165abbf590cdb7a28c5a90d3477e9a25712dd6", 0xbe}, {&(0x7f00000002c0)="d9bd76eaeb2279072403b8958ce414a6bbc86f20642f", 0x16}, {&(0x7f0000000800)="78e3350079b7f7254c9fa3cf8bc28e", 0xf}], 0x4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x0, 0x9}, 0x28, 0x101, 0xf, 0x0, 0x0, 0x7ef, 0x40, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}]}, 0x31}}, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000001c0)={0x0, 0x1, 0x1ff, {0x0, 0x3ff}, {0xf171, 0x1}, @rumble={0x9, 0x8}}) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_dev$evdev(&(0x7f00000004c0), 0x2, 0x38d082) (async) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000280)=@default_ibss_ssid, 0x6, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000008c0)={0x7, &(0x7f0000000880)=[{0x81, 0x3f, 0x6, 0x1000}, {0x1, 0x8, 0x20, 0x5ca}, {0xb289, 0x3f, 0x0, 0x2}, {0x5, 0x1, 0xb8, 0x3}, {0xe7c, 0x6, 0x4, 0x2}, {0x401, 0x7, 0x1, 0x1000}, {0x8, 0x6, 0x8, 0x7837}]}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) (async) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)={0x184, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x184}, 0x1, 0x0, 0x0, 0x20004081}, 0x811) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) (async) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000400)="848a97e260ff6d653fb73630f1eb62536d1d015f74ccd17bdc354719c4727419c0e09da39c09ac239e966b7660d5364c838f8d73f5d00039581d76bec7b08eb57f33d5817d3f45558f035024be9001ed9c507a9386576d3431cf8a229d463fe4139f3ac54cf30d0128f8c3abc821b20b62fd8631431462b5dac9051b729b7c0a4057a7063fac87252fbb9d9e8dada364c7cfbfd4c5df25b4283430aef4ce1343d80b16e9a01193c96520fd87c219d1d9749818c2e1ac68b4", 0xb8}, {&(0x7f0000000740)="3ad53687bd45562610827409a7ab49ceb20a7ec26976944ac2d4140f90f572bec33e4370cb6346ddb12a13601d7d41029784fff0bee48e571082296e101ec96229feaea953635918b4202ad12e0ca5935f335a456658e7ebf48aa4154119ae1b692cfda96e3fccca143528bc1c1842cde80e93f3cc415083e589738b0e04362fdd907cd465e4da8f7a4ce26e528479b7a94b88f6738ceaae46d55d26e933d473573cacd7b8720db6f5bf7c165abbf590cdb7a28c5a90d3477e9a25712dd6", 0xbe}, {&(0x7f00000002c0)="d9bd76eaeb2279072403b8958ce414a6bbc86f20642f", 0x16}, {&(0x7f0000000800)="78e3350079b7f7254c9fa3cf8bc28e", 0xf}], 0x4) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x0, 0x9}, 0x28, 0x101, 0xf, 0x0, 0x0, 0x7ef, 0x40, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}]}, 0x31}}, 0x0) (async) 06:30:30 executing program 5: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000240)="cefaad1b9cf4636420b43b8e", 0xc, 0x4}, {0x0, 0x0, 0xd4c5}], 0x0, &(0x7f0000010300)) [ 863.541134] attempt to access beyond end of device 06:30:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x3fc000) [ 863.567776] loop2: rw=12288, want=8200, limit=12 [ 863.601157] attempt to access beyond end of device 06:30:30 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0xb1}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = socket$inet6(0xa, 0x4, 0x8dd) sendto$inet6(r3, &(0x7f0000000140)="3c2feb327f35698735b7b974fd54b3c32a9f272b5793449c19ea9a06a593055f6e6265e817e7abdbb436293c5383693b0e54e5b2e1ceaad8db49c425fbfc531f2f297aeae68560fa0f1587a77e1a406fc9ac23bdbbce32b656b6df40e7d6def7740a56045ec2ef81874f230ffc2f7a41704fcc2e80c0cffe561db6db7a18842a752b9b2ba3d61bdace0c7d95c1bff88fe6c103bd4e4b2df4694246bc61f578dbb6cd42038860f5c412", 0xa9, 0x4000, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000)="571ded48857e56e7f2d79851a44b10a3b62e03005167140e955498af6013ab04d7bb1adc60d67b835a43fdaa0a7d89f8f3d303c52fe203210ddcd8eb71c24a20dc7a81a4fbc83bdce4c9796eb6faf436e7bb83a5a72ed7d2a7e976351bddff63f23936cf419dabf321b251f6d621586c8502e6cefa6cc506569e15dbab9cac08f1e347ee4a85e0fecddc1261970a31e822bea16c39c5b188129cec87d0886b7b517a2fae1a9c9cea9428bf17f93b9045c80e35ced7ba7d2633e236ebbe173d3095e6cbd0ef02b339533853ceb830c4d078823aa9116277c1b3966147c267ffb2aeac4397d729f13469c6fc7ab7b44ca60195aa88fab58789", 0xf8, 0x40, &(0x7f0000000100)={0xa, 0x4e24, 0xea, @private2={0xfc, 0x2, '\x00', 0x1}, 0x30c63c1b}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9498, 0xf0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet6_sctp(0xa, 0x1, 0x84) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0xb1}, 0x9c) (async) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) (async) syz_open_dev$tty1(0xc, 0x4, 0x1) (async) dup(r1) (async) socket$inet6(0xa, 0x4, 0x8dd) (async) sendto$inet6(r3, &(0x7f0000000140)="3c2feb327f35698735b7b974fd54b3c32a9f272b5793449c19ea9a06a593055f6e6265e817e7abdbb436293c5383693b0e54e5b2e1ceaad8db49c425fbfc531f2f297aeae68560fa0f1587a77e1a406fc9ac23bdbbce32b656b6df40e7d6def7740a56045ec2ef81874f230ffc2f7a41704fcc2e80c0cffe561db6db7a18842a752b9b2ba3d61bdace0c7d95c1bff88fe6c103bd4e4b2df4694246bc61f578dbb6cd42038860f5c412", 0xa9, 0x4000, 0x0, 0x0) (async) sendto$inet6(r2, &(0x7f0000000000)="571ded48857e56e7f2d79851a44b10a3b62e03005167140e955498af6013ab04d7bb1adc60d67b835a43fdaa0a7d89f8f3d303c52fe203210ddcd8eb71c24a20dc7a81a4fbc83bdce4c9796eb6faf436e7bb83a5a72ed7d2a7e976351bddff63f23936cf419dabf321b251f6d621586c8502e6cefa6cc506569e15dbab9cac08f1e347ee4a85e0fecddc1261970a31e822bea16c39c5b188129cec87d0886b7b517a2fae1a9c9cea9428bf17f93b9045c80e35ced7ba7d2633e236ebbe173d3095e6cbd0ef02b339533853ceb830c4d078823aa9116277c1b3966147c267ffb2aeac4397d729f13469c6fc7ab7b44ca60195aa88fab58789", 0xf8, 0x40, &(0x7f0000000100)={0xa, 0x4e24, 0xea, @private2={0xfc, 0x2, '\x00', 0x1}, 0x30c63c1b}, 0x1c) (async) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9498, 0xf0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) (async) [ 863.633966] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 863.663401] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 06:30:30 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000d0000000e000000952eebbdda62aabab05e73e4cbd19d5af5ec80052b1732d6532f87ecbbdf71376828780080000000000000f8c2d394fc0ec662abbbda7cdf0b130a6b3b234bbd4211e61b20946ce65c6df1b87a3b124b94bc6c3c4d52c852617dc7955997f6aa95dfd7908766bd25b6bc8195131106f4ac2ff0c6ba95f786045356883026097bc21fbded2b03fe000bba4b"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='lock_acquire\x00', r0}, 0x10) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'security\x00', 0x21880}, &(0x7f0000000080)=0x54) 06:30:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) listen(r0, 0x200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x3}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x4}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getnetconf={0x4c, 0x52, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x3}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x6}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x200}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x13341c92}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtaction={0xa0, 0x30, 0x1, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}, @m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x2}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@newtclass={0x3c, 0x28, 0x14, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xf, 0xfff2}, {0x2, 0xd}, {0x10, 0xffe0}}, [@tclass_kind_options=@c_mqprio={0xb}, @tclass_kind_options=@c_skbprio={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040001) perf_event_open(&(0x7f00000005c0)={0x3, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x40, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x3220, 0xfffffffffffffff7, 0xfffffff7, 0x0, 0x9, 0x0, 0x80, 0x0, 0x8, 0x0, 0x1ff}, r6, 0xb, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000340)={0x6, 0x80, 0x4e, 0x0, 0xfa, 0x7f, 0x0, 0x7, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x7d, 0x2, 0x2, 0x4, 0xffff, 0x9, 0x0, 0xffff1917, 0x0, 0x2}, r6, 0x6, 0xffffffffffffffff, 0x2) [ 863.683078] loop2: rw=12288, want=12296, limit=12 [ 863.697997] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 863.721695] attempt to access beyond end of device [ 863.754377] loop2: rw=12288, want=8200, limit=12 06:30:30 executing program 5: sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="00002abd7000fddbdf2509000000080001007063690011000200303030303a30303a31302e300000000008000300020000000800090007000000"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000001340)={[0x2]}, 0x8, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="0300", 0x2, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4015) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="980e00a0ecfa55a8d24209000000000000000000840e0100800e01000a0001007065646974000000540e0280500e02000000000000000000000000000000000000000000978100000000000000000000000000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a10000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000a900000000000000000000000000000000000013000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d00000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040006000c00070000000000000000000c0008000000000000000000"], 0xe98}}, 0x0) [ 863.776497] attempt to access beyond end of device 06:30:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x3fc000) [ 863.833702] IPVS: ftp: loaded support on port[0] = 21 [ 863.840528] loop2: rw=12288, want=12296, limit=12 06:30:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x3fc000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_type(r0, &(0x7f0000000000), 0x3fc000) (async) [ 863.886479] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 863.923472] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 06:30:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000050000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 863.970416] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 06:30:30 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0xb1}, 0x9c) (async) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) r3 = socket$inet6(0xa, 0x4, 0x8dd) sendto$inet6(r3, &(0x7f0000000140)="3c2feb327f35698735b7b974fd54b3c32a9f272b5793449c19ea9a06a593055f6e6265e817e7abdbb436293c5383693b0e54e5b2e1ceaad8db49c425fbfc531f2f297aeae68560fa0f1587a77e1a406fc9ac23bdbbce32b656b6df40e7d6def7740a56045ec2ef81874f230ffc2f7a41704fcc2e80c0cffe561db6db7a18842a752b9b2ba3d61bdace0c7d95c1bff88fe6c103bd4e4b2df4694246bc61f578dbb6cd42038860f5c412", 0xa9, 0x4000, 0x0, 0x0) (async) sendto$inet6(r2, &(0x7f0000000000)="571ded48857e56e7f2d79851a44b10a3b62e03005167140e955498af6013ab04d7bb1adc60d67b835a43fdaa0a7d89f8f3d303c52fe203210ddcd8eb71c24a20dc7a81a4fbc83bdce4c9796eb6faf436e7bb83a5a72ed7d2a7e976351bddff63f23936cf419dabf321b251f6d621586c8502e6cefa6cc506569e15dbab9cac08f1e347ee4a85e0fecddc1261970a31e822bea16c39c5b188129cec87d0886b7b517a2fae1a9c9cea9428bf17f93b9045c80e35ced7ba7d2633e236ebbe173d3095e6cbd0ef02b339533853ceb830c4d078823aa9116277c1b3966147c267ffb2aeac4397d729f13469c6fc7ab7b44ca60195aa88fab58789", 0xf8, 0x40, &(0x7f0000000100)={0xa, 0x4e24, 0xea, @private2={0xfc, 0x2, '\x00', 0x1}, 0x30c63c1b}, 0x1c) (async) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9498, 0xf0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 864.161496] attempt to access beyond end of device 06:30:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000a29000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/25, 0x19, 0x1, &(0x7f0000001100)=""/70, 0x46}, &(0x7f0000001180)=0x40) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x0, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) perf_event_open(&(0x7f0000002340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb71}, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000100)={{}, 0x0, 0x0, @unused=[0x20, 0x0, 0x8, 0x8], @subvolid}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) write$UHID_INPUT(r3, &(0x7f0000002080)={0x8, {"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", 0x1000}}, 0x1006) shutdown(r3, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100080737) [ 864.210789] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 864.226699] loop2: rw=12288, want=8200, limit=12 [ 864.272925] attempt to access beyond end of device 06:30:31 executing program 5: sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="00002abd7000fddbdf2509000000080001007063690011000200303030303a30303a31302e300000000008000300020000000800090007000000"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4) (async) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000001340)={[0x2]}, 0x8, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="0300", 0x2, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) (async) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) (async) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4015) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) (async) umount2(&(0x7f0000000180)='./file0\x00', 0x1) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="980e00a0ecfa55a8d24209000000000000000000840e0100800e01000a0001007065646974000000540e0280500e02000000000000000000000000000000000000000000978100000000000000000000000000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a10000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000a900000000000000000000000000000000000013000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d00000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040006000c00070000000000000000000c0008000000000000000000"], 0xe98}}, 0x0) [ 864.316881] loop2: rw=12288, want=12296, limit=12 06:30:31 executing program 3: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000140)='\x00', 0x4) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) [ 864.355863] attempt to access beyond end of device [ 864.386129] loop2: rw=12288, want=8200, limit=12 06:30:31 executing program 3: syz_mount_image$befs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x1008, &(0x7f0000000840)) 06:30:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) listen(r0, 0x200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x3}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x4}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getnetconf={0x4c, 0x52, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x3}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x6}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x200}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x13341c92}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtaction={0xa0, 0x30, 0x1, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}, @m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x2}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@newtclass={0x3c, 0x28, 0x14, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xf, 0xfff2}, {0x2, 0xd}, {0x10, 0xffe0}}, [@tclass_kind_options=@c_mqprio={0xb}, @tclass_kind_options=@c_skbprio={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040001) perf_event_open(&(0x7f00000005c0)={0x3, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x40, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x3220, 0xfffffffffffffff7, 0xfffffff7, 0x0, 0x9, 0x0, 0x80, 0x0, 0x8, 0x0, 0x1ff}, r6, 0xb, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000340)={0x6, 0x80, 0x4e, 0x0, 0xfa, 0x7f, 0x0, 0x7, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x7d, 0x2, 0x2, 0x4, 0xffff, 0x9, 0x0, 0xffff1917, 0x0, 0x2}, r6, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) (async) listen(r0, 0x200) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) (async) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x3}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x4}]}}]}, 0x3c}}, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getnetconf={0x4c, 0x52, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x3}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x6}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x200}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x13341c92}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtaction={0xa0, 0x30, 0x1, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}, @m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x2}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) (async) getpid() (async) sched_setscheduler(r6, 0x5, &(0x7f0000000380)) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@newtclass={0x3c, 0x28, 0x14, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xf, 0xfff2}, {0x2, 0xd}, {0x10, 0xffe0}}, [@tclass_kind_options=@c_mqprio={0xb}, @tclass_kind_options=@c_skbprio={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040001) (async) perf_event_open(&(0x7f00000005c0)={0x3, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x40, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x3220, 0xfffffffffffffff7, 0xfffffff7, 0x0, 0x9, 0x0, 0x80, 0x0, 0x8, 0x0, 0x1ff}, r6, 0xb, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000340)={0x6, 0x80, 0x4e, 0x0, 0xfa, 0x7f, 0x0, 0x7, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x7d, 0x2, 0x2, 0x4, 0xffff, 0x9, 0x0, 0xffff1917, 0x0, 0x2}, r6, 0x6, 0xffffffffffffffff, 0x2) (async) [ 864.423183] attempt to access beyond end of device [ 864.437297] loop2: rw=12288, want=12296, limit=12 [ 864.463227] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 06:30:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000d0000000e000000952eebbdda62aabab05e73e4cbd19d5af5ec80052b1732d6532f87ecbbdf71376828780080000000000000f8c2d394fc0ec662abbbda7cdf0b130a6b3b234bbd4211e61b20946ce65c6df1b87a3b124b94bc6c3c4d52c852617dc7955997f6aa95dfd7908766bd25b6bc8195131106f4ac2ff0c6ba95f786045356883026097bc21fbded2b03fe000bba4b"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='lock_acquire\x00', r0}, 0x10) (async) unshare(0x6c060000) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) (async) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'security\x00', 0x21880}, &(0x7f0000000080)=0x54) 06:30:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) (async) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000a29000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/25, 0x19, 0x1, &(0x7f0000001100)=""/70, 0x46}, &(0x7f0000001180)=0x40) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x0, 0x6}) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) perf_event_open(&(0x7f0000002340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb71}, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000100)={{}, 0x0, 0x0, @unused=[0x20, 0x0, 0x8, 0x8], @subvolid}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) write$UHID_INPUT(r3, &(0x7f0000002080)={0x8, {"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", 0x1000}}, 0x1006) shutdown(r3, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, 0x0) (async) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100080737) 06:30:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000060000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:31 executing program 5: sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="00002abd7000fddbdf2509000000080001007063690011000200303030303a30303a31302e300000000008000300020000000800090007000000"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4) (async) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) signalfd4(0xffffffffffffffff, &(0x7f0000001340)={[0x2]}, 0x8, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) (async) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="0300", 0x2, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) (async) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='cubic\x00', 0x6) (async) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4015) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="980e00a0ecfa55a8d24209000000000000000000840e0100800e01000a0001007065646974000000540e0280500e02000000000000000000000000000000000000000000978100000000000000000000000000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a10000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000a900000000000000000000000000000000000013000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d00000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040006000c00070000000000000000000c0008000000000000000000"], 0xe98}}, 0x0) [ 864.561445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 864.571667] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 864.599942] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:30:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000a29000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/25, 0x19, 0x1, &(0x7f0000001100)=""/70, 0x46}, &(0x7f0000001180)=0x40) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x0, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) (async) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) perf_event_open(&(0x7f0000002340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb71}, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, 0x0) (async) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000100)={{}, 0x0, 0x0, @unused=[0x20, 0x0, 0x8, 0x8], @subvolid}) (async) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) write$UHID_INPUT(r3, &(0x7f0000002080)={0x8, {"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", 0x1000}}, 0x1006) (async) shutdown(r3, 0x0) (async) ioctl$PPPIOCGCHAN(r1, 0x80047437, 0x0) (async) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100080737) 06:30:31 executing program 3: memfd_create(&(0x7f0000000140)='\x00', 0x4) [ 864.653934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 864.674552] attempt to access beyond end of device [ 864.679625] loop2: rw=12288, want=8200, limit=12 [ 864.694463] attempt to access beyond end of device [ 864.704130] loop2: rw=12288, want=12296, limit=12 [ 864.710725] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 864.732943] attempt to access beyond end of device [ 864.743313] loop2: rw=12288, want=8200, limit=12 06:30:31 executing program 3: r0 = socket(0x10, 0x2, 0x0) bind$isdn(r0, 0x0, 0x0) 06:30:31 executing program 5: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f00000002c0)={'sit0\x00', 0x0}) [ 864.755241] IPVS: ftp: loaded support on port[0] = 21 [ 864.760247] attempt to access beyond end of device [ 864.782724] loop2: rw=12288, want=12296, limit=12 06:30:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000070000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:31 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000900), 0x40000, 0x0) 06:30:31 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000080)) [ 864.949221] attempt to access beyond end of device [ 864.986343] loop2: rw=12288, want=8200, limit=12 [ 865.011122] attempt to access beyond end of device [ 865.023387] loop2: rw=12288, want=12296, limit=12 [ 865.044976] attempt to access beyond end of device [ 865.049941] loop2: rw=12288, want=8200, limit=12 06:30:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) (async) r2 = socket(0x10, 0x3, 0x0) (async) listen(r0, 0x200) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) (async) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) (async) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x3}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x4}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getnetconf={0x4c, 0x52, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x3}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x6}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x200}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x13341c92}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtaction={0xa0, 0x30, 0x1, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}, @m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x2}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) (async) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@newtclass={0x3c, 0x28, 0x14, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xf, 0xfff2}, {0x2, 0xd}, {0x10, 0xffe0}}, [@tclass_kind_options=@c_mqprio={0xb}, @tclass_kind_options=@c_skbprio={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040001) (async) perf_event_open(&(0x7f00000005c0)={0x3, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x40, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x3220, 0xfffffffffffffff7, 0xfffffff7, 0x0, 0x9, 0x0, 0x80, 0x0, 0x8, 0x0, 0x1ff}, r6, 0xb, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000340)={0x6, 0x80, 0x4e, 0x0, 0xfa, 0x7f, 0x0, 0x7, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x7d, 0x2, 0x2, 0x4, 0xffff, 0x9, 0x0, 0xffff1917, 0x0, 0x2}, r6, 0x6, 0xffffffffffffffff, 0x2) [ 865.061023] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 865.079614] attempt to access beyond end of device [ 865.088761] loop2: rw=12288, want=12296, limit=12 06:30:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000d0000000e000000952eebbdda62aabab05e73e4cbd19d5af5ec80052b1732d6532f87ecbbdf71376828780080000000000000f8c2d394fc0ec662abbbda7cdf0b130a6b3b234bbd4211e61b20946ce65c6df1b87a3b124b94bc6c3c4d52c852617dc7955997f6aa95dfd7908766bd25b6bc8195131106f4ac2ff0c6ba95f786045356883026097bc21fbded2b03fe000bba4b"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='lock_acquire\x00', r0}, 0x10) (async) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) (async) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'security\x00', 0x21880}, &(0x7f0000000080)=0x54) 06:30:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x3, 0x4}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000680)=""/4096, 0x38, 0x1000, 0x1}, 0x20) 06:30:31 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/98, 0x62}], 0x300}, 0x0) sendmsg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="8f1d9dc83e59d5807d816c91edeb45bbb2cf", 0x12}, {&(0x7f0000000240)="cf8c8b82ce9697468455fca91906d7b3bab0414e9e68b2b5873945cda54f94f4b9b06da253caddd5f9f271c6b211f2b24b448bec788a7edbb6f0df0e26d9d21cfc2e2677d729ce764c110c81ee1a1ffe55", 0x51}], 0x2, &(0x7f00000003c0)=ANY=[], 0xa0}, 0x0) 06:30:31 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x60000000, 0x0, 0x38, 0x0, 0x0}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 06:30:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000080000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 865.170448] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 865.192321] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 06:30:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)=""/112, 0x70}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000016c0)=""/28, 0x1c}, 0x40) [ 865.279702] attempt to access beyond end of device 06:30:31 executing program 1: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x40040) 06:30:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x1, 0xae, &(0x7f0000000400)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 06:30:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00', 0x1c01}) ioctl$TUNSETSNDBUF(r0, 0x800454e0, &(0x7f0000000000)=0x4) [ 865.300015] loop2: rw=12288, want=8200, limit=12 [ 865.311612] IPVS: ftp: loaded support on port[0] = 21 [ 865.329480] attempt to access beyond end of device [ 865.364464] loop2: rw=12288, want=12296, limit=12 06:30:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x15a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB="c32de2f0"]) 06:30:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00', 0x1c01}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)) [ 865.388070] attempt to access beyond end of device [ 865.431689] loop2: rw=12288, want=8200, limit=12 06:30:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x15a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8}]}) [ 865.460716] attempt to access beyond end of device [ 865.487013] loop2: rw=12288, want=12296, limit=12 06:30:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:30:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00', 0x1c01}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x15) 06:30:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00', 0x1c01}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)) 06:30:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000090000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8940, 0x0) 06:30:32 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x24005, 0x0) 06:30:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x0, 0x0, 0x11}]}}, &(0x7f0000000280)=""/138, 0x2a, 0x8a, 0x1}, 0x20) [ 865.773269] attempt to access beyond end of device [ 865.800123] loop2: rw=12288, want=8200, limit=12 06:30:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x8, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 06:30:32 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x2002, 0x0) 06:30:32 executing program 1: r0 = getpid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x1d, 0x4, @tid=r0}, &(0x7f0000000040)) [ 865.826078] attempt to access beyond end of device 06:30:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f0000000340), 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) mount$fuseblk(0x0, &(0x7f0000002640)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000006a40)={&(0x7f0000006940)={0x10, 0x0, 0x0, 0x80020010}, 0xc, &(0x7f0000006a00)={&(0x7f0000006980)={0x14}, 0x14}}, 0x0) [ 865.875707] loop2: rw=12288, want=12296, limit=12 06:30:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000003a00011025bd7000fddbdf250a"], 0x14}}, 0x0) [ 865.908609] attempt to access beyond end of device 06:30:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x18, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:30:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000840)={&(0x7f0000000080), 0xc, &(0x7f0000000800)={&(0x7f0000000100)={0x48, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0x25, 0x6, @device_b}, @NL80211_ATTR_FRAME={0xfffffffffffffed6, 0x33, @mgmt_frame=@auth={@wo_ht={{}, {}, @device_a={0x8, 0x2, 0x11, 0x0, 0x0, 0x5}}, 0x0, 0x0, 0x0, @val={0x10, 0x1}}}]}, 0x48}}, 0x0) [ 865.936281] loop2: rw=12288, want=8200, limit=12 06:30:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote}}) sendmmsg$inet6(r0, &(0x7f0000000000), 0x4b, 0x0) [ 865.971015] attempt to access beyond end of device [ 865.990987] loop2: rw=12288, want=12296, limit=12 06:30:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000b0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:32 executing program 0: mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000022c0)={&(0x7f0000002280)='./file0\x00'}, 0x10) 06:30:32 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00000012000162"], 0x4c}}, 0x0) 06:30:32 executing program 4: prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ff5000/0xb000)=nil) 06:30:32 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 06:30:32 executing program 3: syz_genetlink_get_family_id$gtp(&(0x7f0000000340), 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x1ff, &(0x7f0000006a80)) 06:30:32 executing program 0: syz_mount_image$vfat(&(0x7f0000002240), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000002700)=[{0x0}], 0x4400, &(0x7f0000002600)={[{@shortname_win95}, {@shortname_winnt}, {@uni_xlateno}]}) 06:30:32 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x410083, 0x0) 06:30:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) socketpair(0x0, 0xa, 0x0, 0x0) [ 866.176893] attempt to access beyond end of device 06:30:32 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 06:30:32 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40605346, &(0x7f0000000200)) tkill(0x0, 0x0) [ 866.205832] loop2: rw=12288, want=8200, limit=12 06:30:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "ebf5efc154931912ed3b9303dc18b8a6722fbca3434da359aa36d805a6835446dc91473b210a240ae64c4976b7431b8350a82cdbbd17dbc33751f748854abbbb"}, 0x48, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 866.240143] attempt to access beyond end of device [ 866.262099] loop2: rw=12288, want=12296, limit=12 [ 866.305404] attempt to access beyond end of device [ 866.314037] loop2: rw=12288, want=8200, limit=12 [ 866.321598] attempt to access beyond end of device [ 866.339051] loop2: rw=12288, want=12296, limit=12 06:30:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000f0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:33 executing program 3: unshare(0x0) unshare(0x68020480) 06:30:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 06:30:33 executing program 5: syz_mount_image$iso9660(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xff0f, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000540)) 06:30:33 executing program 0: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) 06:30:33 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) 06:30:33 executing program 3: syz_open_dev$dri(&(0x7f00000003c0), 0x8, 0x0) 06:30:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 06:30:33 executing program 3: add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x4800, 0x0) [ 866.513386] isofs_fill_super: bread failed, dev=loop5, iso_blknum=32, block=64 06:30:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x7, &(0x7f0000000180), 0x4) 06:30:33 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000340)="8f", 0x1, 0x10000}], 0x0, &(0x7f00000004c0)) 06:30:33 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/103, 0x67}], 0x1, &(0x7f0000000640)=[{&(0x7f00000004c0)=""/27, 0x1b}, {0x0}], 0x2, 0x0) 06:30:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000100000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0xb, 0x0, &(0x7f0000000000)) 06:30:33 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x0) 06:30:33 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 06:30:33 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) 06:30:33 executing program 3: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) pselect6(0x40, &(0x7f00000000c0)={0x9}, &(0x7f0000000100)={0x6}, &(0x7f0000000140), &(0x7f00000001c0)={r0}, 0x0) 06:30:33 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 06:30:33 executing program 1: socketpair(0x10, 0x2, 0x8, &(0x7f0000000000)) 06:30:33 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f00000011c0)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0x0}}, 0x120) 06:30:33 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) 06:30:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x2, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 06:30:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000130000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:33 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x0) 06:30:33 executing program 1: setpgid(0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='-}\x00', 0xffffffffffffffff) request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00tB\x85\xf9\xedD\x82=\xff\xff\x98\xa7S\xb4\xb7<\xae\xf3\xbe', 0x0) 06:30:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x20}, 0x20}, 0x1, 0x10}, 0x0) 06:30:33 executing program 5: sysfs$1(0x1, &(0x7f0000000000)='\x04\\\xa7\x90\x92\xe323 \xce84\xc4\xe8\x00D\xb0\xc9\xaa\xa2\x1f\x0f\x9b*\xf8\x1b\x87\x18\xb3\\_\xde\xa5\x9em\xd2\x03oN\x19\xe3\xe8\x11_\xc8\xae\xfb+9S\x1b\x8f/\v\xa0\xc5\xd6\xcff\xebRFy\x90Gr\xb9\x8e\xa1\xe48i\rD64\xc1\xab\xc5\x19WF\x1b\xa9WRiZ\xe2[\xdf\xe5>\x99a@\xce\x89E\x90:y\x00'/124) 06:30:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000140000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:33 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) 06:30:33 executing program 4: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000001600)={{0x0, 0x0, 0x80}}) 06:30:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY={0xc, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8}]}]}, 0x28}}, 0x0) 06:30:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x9, 0x0, 0x0, 0x0, 0x0, "6e70c4317bea3efc60c6d8e779b0260ab43c2c"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0xff) 06:30:33 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="60000000100043040036d1000000000100000000", @ANYRES32=r3, @ANYBLOB="0304000000000000400012800800010067726500340002800800070064"], 0x60}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3}, 0x14) socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000001dc0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)='5', 0x1}], 0x1}}], 0x1, 0x0) 06:30:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r2, 0x301, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x1c}}, 0x0) [ 867.104603] IPVS: ftp: loaded support on port[0] = 21 06:30:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002ffffff1f0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="200000000600000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 06:30:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000040000/0x18000)=nil, &(0x7f0000000cc0)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @pic={0x0, 0x9, 0x0, 0x0, 0x0, 0x8}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x2000, &(0x7f0000fe4000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[], 0x0, 0x183201}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 867.229502] IPVS: ftp: loaded support on port[0] = 21 06:30:34 executing program 0: r0 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f00000004c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {&(0x7f00000021c0)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1df001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18edfff8d1980700000000aff632810b4f7500000000000000ad25822a17b17f463e10417bc19c2ad2fbd1e5e0aaa2ab21ddc0777df2ec4f62826086704d703da32c47364aed74cd748a17000000000001000106c155f32244dbebeab6d3ed941a1cacccf272186cc622d829c7", 0xa6, 0x5fc}, {0x0, 0x0, 0x10dff}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'macromanian'}}]}) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) [ 867.292763] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 867.312641] f2fs_msg: 75 callbacks suppressed [ 867.312655] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 4294967042) 06:30:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc008aec1, &(0x7f0000001600)={{0x0, 0x0, 0x80}}) 06:30:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) close(r1) [ 867.398217] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 867.436499] F2FS-fs (loop2): Unable to read 2th superblock [ 867.479461] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 4294967042) [ 867.503555] kvm: pic: non byte write [ 867.521620] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 867.592265] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 867.644130] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 06:30:34 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) 06:30:34 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a0012fb, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000700, 0x1004000}]) 06:30:34 executing program 5: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3) 06:30:34 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000200000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:34 executing program 4: pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) sendmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 06:30:34 executing program 4: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{0x0}], 0x1}, 0x0) 06:30:34 executing program 5: getpgrp(0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ff9000/0x2000)=nil, 0x0) 06:30:34 executing program 0: getsockopt$inet_opts(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 867.944877] F2FS-fs (loop2): Wrong secs_per_zone / total_sections (32, 11) [ 867.961784] IPVS: ftp: loaded support on port[0] = 21 [ 867.977242] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 868.031673] F2FS-fs (loop2): Unable to read 2th superblock 06:30:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 06:30:34 executing program 4: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000001680)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x1, &(0x7f00000015c0), 0xa}, 0x0) 06:30:34 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f00000001c0)={0x0, 0x2, "d3b2"}, &(0x7f0000000080)=0xa) 06:30:34 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f00000000c0), 0x8) 06:30:35 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) 06:30:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000250000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000600)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x4f}, 0x98) 06:30:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x40141, 0x0) 06:30:35 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 06:30:35 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000280)='-', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 06:30:35 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000002640)=@in6={0x1c, 0x1c}, 0x1c) 06:30:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000003f0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@authinfo={0x10}, @authinfo={0x10}, @prinfo={0x14, 0x84, 0x7, {0xf}}], 0x34}, 0x0) 06:30:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@prinfo={0x14}, @authinfo={0x10}], 0x24}, 0x0) [ 868.667586] IPVS: ftp: loaded support on port[0] = 21 06:30:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f00000000c0), 0x8) 06:30:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000001740), &(0x7f0000001780)=0x8) 06:30:35 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) 06:30:35 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x96b) 06:30:35 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) read$char_usb(r0, &(0x7f0000000000), 0x0) 06:30:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000400000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:35 executing program 0: r0 = mq_open(&(0x7f00000001c0)='[)\\(%\x00', 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) 06:30:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8041, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) dup3(r1, r0, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 06:30:35 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x1c53c1, 0x25) 06:30:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8041, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x2a200, 0xbb) 06:30:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0xf, 0x3, &(0x7f0000000d00)=@framed, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:30:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="40000000100001"], 0x40}, 0x18}, 0x0) 06:30:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000630000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 869.156056] IPVS: ftp: loaded support on port[0] = 21 06:30:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) [ 869.203530] kauditd_printk_skb: 97 callbacks suppressed [ 869.203576] audit: type=1804 audit(1646721035.867:508): pid=31401 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2366839211/syzkaller.3mJodH/1396/file0" dev="sda1" ino=15234 res=1 06:30:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003820000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@gettaction={0x20, 0x32, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0x3}]}, 0x20}}, 0x0) 06:30:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 06:30:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=@newqdisc={0x24, 0x24, 0x1}, 0x24}}, 0x0) 06:30:36 executing program 4: munmap(&(0x7f0000fff000/0x1000)=nil, 0x3000) 06:30:36 executing program 3: prctl$PR_SET_TIMERSLACK(0x1a, 0x0) 06:30:36 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 06:30:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) 06:30:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, 0x0, 0x0) 06:30:36 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x89a1, 0x0) [ 869.624373] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 06:30:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003850000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 869.698130] tc_dump_action: action bad kind 06:30:36 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/notes', 0x0, 0x0) 06:30:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, r1, 0x20b, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x8}]}, 0x24}}, 0x0) 06:30:36 executing program 1: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 06:30:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000dc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0xfec2}, @void}}}, 0x1c}}, 0x0) 06:30:36 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_gettime(r0, &(0x7f00000002c0)) 06:30:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003860000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:36 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) 06:30:36 executing program 4: setresuid(0x0, 0xee00, 0x0) socket(0x11, 0x0, 0x2) 06:30:36 executing program 0: r0 = openat$urandom(0xffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000300)=0xfffffc00) [ 869.887498] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 06:30:36 executing program 5: socketpair(0x25, 0x3, 0x81, &(0x7f0000001480)) 06:30:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x0, 0x0, 0x0, 0x10a}, 0x48) 06:30:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x8}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003870000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x0) 06:30:36 executing program 3: syz_open_dev$mouse(&(0x7f0000000300), 0x0, 0x4002) 06:30:36 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) fcntl$getflags(r0, 0x0) 06:30:36 executing program 0: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) socket$inet(0x2, 0x0, 0x0) 06:30:36 executing program 4: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 06:30:36 executing program 1: open(&(0x7f0000001740)='./file0\x00', 0x1, 0x0) 06:30:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003880000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:36 executing program 3: fcntl$getflags(0xffffffffffffffff, 0x0) 06:30:36 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) clock_gettime(0x4, &(0x7f0000000080)) 06:30:36 executing program 1: syz_open_dev$dri(&(0x7f0000001a40), 0xd50, 0x0) 06:30:37 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x181201, 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000200)="06bb", 0x2}, {&(0x7f0000000340)="c8", 0x1}], 0x2, 0x0, 0x0) 06:30:37 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'syzkaller0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x43}}, 0x10) 06:30:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "201fa6a222d20cad2f09496ac35af26216890bf1784980ff2871c30316ca5c7196efc98744f544f911d734e903414693894529f2768ba2e0428227f4527ae053"}, 0x48, r0) keyctl$link(0x8, 0x0, r1) 06:30:37 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x453, 0x0, 0x0, 0x0, '='}, 0x14}}, 0x0) 06:30:37 executing program 1: open(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001900), 0xffffffffffffffff) 06:30:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003890000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty}}) 06:30:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') 06:30:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) [ 870.457858] audit: type=1107 audit(1646721037.127:509): pid=31547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='=' 06:30:37 executing program 5: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000017c0)='trusted\x00', &(0x7f0000001800)={'syz', 0x3}, 0x0, 0xffffffffffffffff) 06:30:37 executing program 3: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000002740)='./file0\x00', 0x0, 0x29) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$vim2m(0x0, 0x0, 0x2) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) socket$packet(0x11, 0x2, 0x300) 06:30:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) open(&(0x7f0000001740)='./file0\x00', 0x1, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001900), 0xffffffffffffffff) 06:30:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000038a0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:37 executing program 1: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) 06:30:37 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) 06:30:37 executing program 5: mount$9p_virtio(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x40000, 0x0) 06:30:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000240), 0x22, 0x1a1400) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x0, 0x2010000, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 06:30:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000100)={0x4, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, 0x0) 06:30:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000038b0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:37 executing program 4: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) socket$inet(0x2, 0x2, 0x2) r0 = open(&(0x7f0000001740)='./file0\x00', 0x1, 0x86) syz_genetlink_get_family_id$ethtool(&(0x7f0000001900), r0) 06:30:37 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) fcntl$getflags(r0, 0x1) 06:30:37 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000780)={'vcan0\x00'}) 06:30:37 executing program 1: socket$inet6(0xa, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 06:30:37 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000200), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000001300)={{0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}) 06:30:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000280)={0xfffffffffffffffe, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 06:30:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000026930000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:37 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8906, 0x0) 06:30:37 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x54000029) [ 871.235659] ieee802154 phy0 wpan0: encryption failed: -22 [ 871.241269] ieee802154 phy1 wpan1: encryption failed: -22 06:30:38 executing program 3: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000009e80)=[{&(0x7f0000008a80)='5', 0x1}, {&(0x7f0000008b80)='A', 0x1}, {&(0x7f0000008c80)="b2", 0x1}], 0x0, 0x0) 06:30:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000026940000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:38 executing program 0: open(&(0x7f0000001740)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001900), 0xffffffffffffffff) 06:30:38 executing program 5: getitimer(0x0, &(0x7f00000001c0)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 06:30:38 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 06:30:38 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/137, 0x89}], 0x1}, 0x0) 06:30:38 executing program 3: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@dev, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socket$inet6(0xa, 0x0, 0x0) open(&(0x7f0000001740)='./file0\x00', 0x0, 0x0) 06:30:38 executing program 0: shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x8401, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:30:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0xffffc9000fddcfff, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:30:38 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) recvfrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 06:30:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000269d0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:38 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 06:30:38 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x40501, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)="02000000020319", 0x7}, {&(0x7f0000000000)="c2f2a112422937", 0x7}], 0x2) 06:30:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000026ab0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:38 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff018400110800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3090069, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x40, 0x0) 06:30:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0xf, &(0x7f0000000080)=@framed={{}, [@generic={0x3}, @exit, @map_val, @map_idx, @btf_id, @call, @map_idx, @exit]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x8e, &(0x7f0000000300)=""/142, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:30:38 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)={0x124, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x112, 0x0, 0x0, 0x1, [@typed={0x8, 0x1, 0x0, 0x0, @ipv4=@loopback=0x1000000}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="36c421d810f49259508ecf8e82f7f4d3faa2b71f57554c62832964348a01813560e3a0dd45e0e29698e6b09cb7506ec91b2b6282a6cdf9871e057c7acb2005f5e601ed997b2265ac434c284a76ddd80d45bc6b323292eb14fd3111ef260798ed95b92c243e6067f9b0159a9503c714cdca0be9baf8dc7ecdf5885fa03f275f510172fc45dcf5a1e2e097b94599388b96b6a3b6d061b7e6952c474e945e69defa71b0ad707650be9e5ef1e1cee658a22eac6ee50cce75e6916f994402a6190142fbbebfa396fd037d67662a1eb7d934eed736878703ee3c40ad2df8d4b511dc28a68823457703", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}]}, 0x124}], 0x1}, 0x0) 06:30:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x3}]}) 06:30:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, 0x0, 0x80) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={0x0}, 0x1, 0x0, 0x0, 0x40850}, 0x20000015) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, ':\xdc\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 06:30:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003b90000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000080)=""/162, 0x2a, 0xa2, 0x1}, 0x20) 06:30:39 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) accept4$rose(r0, 0x0, 0x0, 0x80000) syz_init_net_socket$rose(0xb, 0x5, 0x0) 06:30:39 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "a18593a438d0192903c550935b718713a59c6ec617f9a8c4d64efd878c02ccb47bc684cb94992864dff8732f5dfef6dbc068c0c3176ee0bbb81b18fccdb98613"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 06:30:39 executing program 5: open(&(0x7f0000001740)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001900), 0xffffffffffffffff) 06:30:39 executing program 3: mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)='u', 0x1}], 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) 06:30:39 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 06:30:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000003c0)=""/4096) 06:30:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000002b80), 0x14) [ 872.569561] f2fs_msg: 99 callbacks suppressed [ 872.569576] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) [ 872.617139] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:30:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffffff, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, 0x0) 06:30:39 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)={0x118, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x107, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback=0x1000000}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x41, 0x0, 0x0, 0x0, @binary="9744ee0accc57048aa6887df8d350098c66a388ab4a1504d88933e2b959b886b9b695a2f75e30ad8576b7dd00010c286f8004eb6db581b663ff7e80ab0"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast2}, @generic="0b86f0413b31fe602afabfeeb3cc2906d9438259bd2b4a2a25877a2abd6bb8c82fe9de763a39402869fff33108567c32d23fa3a579e7627633e92797503e6f0ab3ad834bd24607d728881e3f8cfed7423da27ad2efd59ab4f0f38638e1756c824529ae172c4eb505e1a1b3707e1b8887d668ef0022a3e32dc4d4555d5a9c6b85acbdfb42e3bcc48d3461f7ebdb9dcdc54bde0f"]}]}, 0x118}], 0x1}, 0x0) [ 872.659915] F2FS-fs (loop2): Unable to read 2th superblock [ 872.694040] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) 06:30:39 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x1fbffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f00000051c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) close(r1) accept4(r0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2c}}, 0x0) sendmmsg(r1, &(0x7f0000002780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=ANY=[@ANYBLOB="1000000000000000180100008000000080000000000000000f010000de0e000002439028aad27eda63cfea16b345fcf1ff1254ee4ab879ebed2b102c97fc8e13e75339a5c04936888a1a5d3bc339045a5af29c333d658fa3e0da00fba5b6659a8dec37d2139a53e3d152c9fce1466445634002ced327506b871955685637a39d6479d2e907f4599410d0ea2416dc0000a80000000000000000000000ff7f000018fa0ff142f573f2f3a45778c95e457711c75a401191c4043d9bcfdeadb40354a9f513eb6cc78f136299b009c9a83f60d56feb27ef47d4872461106f25e4362eb505dee70ed20eed73fb98632c3b8042d4eda75f656d789850d4735e85cd375f4e0bdde780df04238861a68f8791459343710ab6f5b947f0f4c433d1fa073d35fa5773b1a678427362bef41e1e0694e71eeb8e000000000010100000000000000f0100000700000077ec62fa73438cef5df5e900a6b6345dca2a286a2d60172af000e29cbc7678b4bc77aaecbbc7874e594a112be5f2e9b5106dbd371f6d8cef01497a8b7842efac8997f0cd0635ec30e988c500a89c073f847c60118413a8bdd248ab012dd96648a7a4729e43e360c90ddd796e21d03c1b60aae606369baf778c1f55679c12a12a33b3ecc7aa54eddbd090dadbeca5feb8ae5f9f03ee5861d9c3fee905b700c9893d096e64ed7d18b70e31285687198edd98dfd9a01cbade71d9ce1e412099f6d45cc7e75ff2cbe475e1617ebac9cda2dcc0906622c5929c6e466525156ed51bba8b1a3701775536a592db947df62f3f364f80cf15bb0236587fcb7eaf5a0a2ae38724fbf71bf001b3070c29c46fc9fbd24d72f21012134bdfbacbf82c91cf6107dca48ef75543135c27e100f4f0abc0312ea764d5fde85e83dc6d3265658ab333eb98f7d8945a30c6f45ca36c27ab7f543c2d77cace02dba2968316b2377aafa292684db3db81f4ef2218abeb04fbad8d99122b8bf3ab39976daa42f3400bd83174f5bbb7f05bb18bf8739d6fae561b7004f6cbe7d79b96e34fc3847e33646f5dfe2670675e2e6af39dc73c84d595ad7e8d92b26377d8e9df462193c10691e2371df9b5498c43aa254560f27f5190bfda0b8a7cec3ddadab683ced479522df9dd5c026553ca24f80ae6dfb6fa88cd5ae8f1ea6842df5fd616a9b564f62485b6d07ce2c4401f71f8f0a06fbf43e32c043220bd1f536acd9679f67b6fe8b98de702673490dd9efb9f3147e2acf0c5abca0eab7db6228906062f5a18a4d5b8d655f022d1a5ab7abeac780ca6a1633220fe1ef3648d570a0c8674c18a626e4dd629f7419e27eb0e5af138987f83bd696cd87acdbad27b13f2abe4ef04b468617cb0690543ffe7527af993e27ed627e62ac0e89e312cda247d4ab2d472fe15b19d03a408f5c4d21dc4cc7f6c15c42c1a3ba4f4d95f37f47a07ec3d3b49c9695e3bde5522ff30f547d8a2f6bdc090b59243ac43e10400ece43bbb36449bc88e92f3bbf38df85227402bb6ab475eaac11f51e6a83cfc0654ac2bfebb09cfe46dfa525698f1604f56c0f816e447d10bec0fb2634faf5683e0fbfee2d2bfbeb1e0ddd90060f9071c121e4f4377da743538b55b6aa793cd5756703b69e6976df81ac5e0655528e37f2e77bfab990bee969b04f80da571f2e760aeb1172b438a56fc6d5d038642ee5ca9480bc08e81ea4fd13749a8766934ae3afe5939ac0490ab148cca73b51f5bb228bf274fd3c6f0f9a41322addf116919fccfb1fed60014e33bb19a5dac809509c13555433e0e77df26c031f23fd180c092d5f867620282c7fca7cadd365c271213756ff60f55e734cd650bc977674e8a24a181700fa1ffb3d1c16b7421389cbbf04796c7b3aae20a76e5ae64c0ea59e02ac3d70f066ecbddde268faee4cead646582161e9b834554ba03a8d0e42aa4c4c72ea9d85d06db93127df2e98149659f0f24a5232833b13e03709cb30ceb76f45aecf806c746afee8866af39c7aaf820217b684550c54d6780e720c8574091255e8d4dd5554e6fe4ba21bbc88988363307d2a6a1b79b03ce3928729024436241c777df85b609f0d3085f1f4b0fabfa124d369e8b818eb08070c056d91f32d67d3b2fc557aaec6bc5b17b6913d0b0b71593bb7c290a7ca277165cb0b850110eed14cebcc904c970e62dfce92933def96bcfedc731ffe2863f31688045aaf12fa226052154e513094f964a1574ceba6636dd9e9b14528d77269afb825312536577df6e92489c26a8f7bc14e9526db5ae2cfdee8f567b1b33f8f819ca83874306a1df6c6f5459e54caeb2f5e1fdf3e35b990b9fd0a0951d969126552a35cb854951844bdfdc68c3fb40d1f62b9041043e9e3485a3a44d25f1700dd94c5776c4b14dcc4d79244e20aaba62d33eb9bab790e7e657a4321d275a5bf46d850b78df0b172e05b57860764ce3ac1229d38a2c60746016ba57602b3e298964cac6dfdc025082889f8422ee86cb465025ac0102b104f5fbda5e63988206caa9880f85c29718c344d2a76d95d39ee5745f37fb3f6eb836208f4a4bef18421e76a46092688d346a28277436908d9bcbfbdc356406a457614d55f51bd60cae63b9f7f48638d363068e9d71146671b2d834592ed4a85c27ad34b1d1571406cfb8ee062824ed764102f655f259fee32f9fc3f701e0ae5519174f627ea941191a13bebf5865416e7f3b8c0fdf4194d1675291ca4c6e68403a991a1393864ace72257f5bec7a9be468610b95a9131903d0969d873126232816cfe36b15a7937464bd0aa322e35e7c57168f2f0238f8bb6dd9e7560654dd7f1b3bd428ddac12b44f5449c635bf0020bb61591d819e0f19c68f399e9271d8fd23cbebcdf04a6f5607b267197ced9328109243d130add27d3c2786721197bbf59fea6ae68a4370640cc75804837b5d81352f15a645533bc321a23dc2b40b8d7ada6a08b4a902e711fe5b22d4fc673a83e08627a5ffe1869cbe29cdcdc8a53d4e671e82b7a7eeb7de880e88eca940e29571f669feb59bc8fa33cba11739061e59452fc92854d4e03e14982008a1f210517b1f39a34892b390b06529338e12cc774b1ed6a1616db9bb6c63d4e4dc9fd4df20a82c63afb92f418b860fd2c8a128c7e257f06210c54611fbe961200f742cc507823f37c5faf442275a9e0896053ff887f6e72fc420cf89e1c3041d228b9e2f03661ab090a1a752864680d9083afd9e544104fd6ba78f8027a0dc9114562225c971450f1c10f429b8daf120d4347e7b0f673675ef58072e72aaac91eaf1a3d224a49fe347008f54101ff02b8eb0dcd1e14be96c067192654c856d04a2910dddfd620a8dd69789b2574f81cfd6ff183f79dc61850898638d6668b1dc528b3d5512abf12a253cc155c4fd6ebfe8e9ae9bcb9285b349a4b30b19aa7002aaa29452c36e563d5ee5627c091074566da89767b2c9752ebe1e9f62f46a5d1eb9c7e62f7dd9bb48b6c8df6c93a0bc02b984fcfc8c5559fdbbc3bffef9798c37f6b5176ac9d9ace3bc0fa875b1bfe16201beca46dd56e4bde106140f56e519f66dd874be331406c77159f136dc738d508b8accd8c81e7aad37db701a7805a26c53a31f66ff60d6ae1084aa5f17c4280db7387f38f5acdc5ab7b08559e6c37e130432b0d5929e9639aee81375085900b3e6c871be0ef8cc7d8f59b5dfa85ae626ea8fd097333a696b0a168a58f5862300757a8e31a9e930fad745ee9165bf69fdbd6a2828d1bcae9232db16a0b4ecdbc3740e81dc3f7d927b6d95a1ce1d1c02f23b456ae3cae038cb078568d4ae566d250e371d6ebccc22ff4045f661d72ce471bda82b77eed96f750f45ba5d8bc13725c3f6154d4e009162366da7687b1b8d66429b1a6df2f6540f9884bef3c99b90c63e150f5c99930101b79c4dbd0dd1c78355110f466516fa2c4f9597c5747f19a809394fbfdc0ab668352a145d9ab05869ef606aed80f4812967661dfba087d86a0e7c6b01bef0c3e7735696a64978e53782e4fe87bb34e4a254abf3adb385cb1519432b38cc79ce5b597d71f5380c76223e84f7742529a95d1e37ac3b262933ef60e82e25d83737d4129a96b2f9d1173857979f58a3eef94d0acc6fa66c56df3d323be5379008329dea3a0a884a617ec6b517e1a580de61d97cfdeab1ee0d4891a217174b2fb44d3e3c99eab45a1c5b0fb61c151ad1c65af897caf84eb059fcbb70d6e7a554505f780d73d220c63d9e8ab1014c27f83f2ab69ff7c36b65e9db754ff137e5ff77a99db34c8fd79d3a9e3b68d267d2caf0d15fe61a1856cd8227352bec78c210da45b94aeef78b2fd19ed26fef69cd9897526c301597a8fe56b311eeeb5cf642d9f23cec276416742dbfcf2025e635db6ad37ff61ccc47652adae6f64d2adbdd9ff1c6a869bb4992cd7b38ed8d025e4dd24140b54ab44e68c55c02ad0b5cc0929fd6e0388e512541c89587937f4f2e85afe64859bdf9ad7621dfcf71d6d094057f49b0fd9025566aea6ae470e21178d52741e185feb012e24b14648e26d6ef9e4d5bf03331dd920cd533332072af4a86981f5854c7f2e03a7e1cd089444dbf0402c0313e855c5e0d1956b92599ffb86102e292532414870da101139932de8ba48bbb974c40c6e08868dc17bbbad401c63743b1231c213e2e0b5fac728641239fedef12a5dc7bf083b2f4e5dd5764679c804f55fe054c834d67f662c9843cb7cd2afa88dad87d12c48cbdf5ad08594fed96e98bc0ab1a2eb205f3fee42f8280c9dc6c8b1b43d9da192dae2ff7059490f2d8cc415b3f2e2fc9ac7585723c4cde69033a766acaa84efec02f4b6317f8ddb514c93e46558af2ad1933a303ff810d1e4896599eef6343265b5962b36f5d8bc9e9219e5cf13dd8db35ff83279b1bddf1a4839a5ef7f3e81e596e53e9869bfc1847ab7a28e06d03bc3fc4931b4f978782be6d31f2eb79ebb252b67368299df0aefd4fcbfdae2cc8b4ed5789f50bd08fc1949fcdcd5dad5fe88b68b62b7ad85e6a0565379536f2b4eed0f97e2ed30603b514767f4a0ed07c5a891a15c888a012e9f9e587dd9d2b2c497f6d64bcc4fcb8b7fbf85dc8d12513c0ecf2a86315ac35f7f7e09a809d44e3fba0020ce7e4ee59c796349dd75082b86850415cd14b024d709a3b52a5349aa75c4163d91c6fc8a46b3891173053cb5d00677ee474dc0ae576bb706b8b0172a7a5b1d11d37bf0e3bb7a851b665ab6cff1f6de853c9ea345c78f2c88c756b37c96e00414fafde4b3b2bbbb0ca07173ad0a5576eed112afa69b033e438e513455cae7a5c1b5e45472e9bef27e4097a05aecc51c758136b7d1d376806c6eeec99f00d9121284938bea270f7ad4d5b220496b31fd1c76c0683a6b7027524cb7d708faafdf0f6dd016a76acc6f6986972c9fe89210419f1dd1e8d9cd56ccb473cee0bfa7659a45a1647a415aa2b240d39fb3845a03992fdbb7d5eba9a8d4b81dd5833b5c2ff8bda41a150c0b38f2ddb467dcd4bd7b7bdc7bbe5b4900a4757b9f98fb0c3c8fdb4e3126ea23a60ade02f20251d595027403080d76424bb8d901c7cd618c5f7c94768b093d70f71444a430914373362a77e25910ffbd2a033126180da1f05136bcd834c6bfd38e47de4d04e4550f61c303855446e3e14f7fc0b093547047c1adce02a5d09636deaa94f038e61431dddc6bf335722fd42642e6e3a936cb3c8fff5cb5795789c66cec2a5b6522fbf4c66f4d597a7c4878c9295093e98fbe0ccb3a2f96387e4754a3a9dd31cbf668ee91950d97d78fd83be57411f78d675853e4eb51f698965a04b09065eb6c027a05eb1eac2cdf707f5a1647529d33a02b0259d292e9ece4b3ef25a675aa92f3c41bf1d792b06b3a00b5625eb2463cdfa6b9e4456e690cdbf9bc8078992658975e939deddc53c8325589c20e78a7e5a4c6f9dc6b5e3052c398e5f1c18566242909705b79f2d5d15e68bcff00bc5e788ec0fd7366f8e6313ead692063d0b62e338437046703c188599db98743723186af5a19259f64ca81ee8da76a50e2d5fd593476cfaff51bc34437f1fdd563451763606f5effafe7f4192d9a5931a931aa7928b20b153beb58bf1f18e2e5b3710ed1b9ec08eb6a4b3e3e3ef423c5c9c217969a1383aa0b3235df094a82e7282e6611c14094534af1fc4a79973e63c4a997d8542d705a6c98be6a69d0952d0f54a4fb135327fd934fb8b9a77ec4fb1d14cd8d0b6cff665953522740241677f33d819bee73eaf13562c7098000000000000000f010000010000008da25e48c4af5b5b7035d2d1ce54956f60938338db83283a02c745f4c37993920fd659b39f828af429ed689a33bb75455905437a6ffe65a73f5e1ee60b655538e78ff3364a49c87ae0da5ef604f194fc0b6dfa534e8727d43b455567443e884ff2b99a26cd80820d0903362aa935ee583f36426802500c53f16427993e65ad69699c6e20000000000801"], 0x12e8}}], 0x1, 0x0) [ 872.732758] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 872.797932] F2FS-fs (loop2): Unable to read 2th superblock 06:30:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003ba0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:39 executing program 4: syz_open_dev$vbi(&(0x7f0000000040), 0x2, 0x2) select(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0) 06:30:39 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x1, 0xdc, &(0x7f0000000240)=""/220, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:30:39 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f00000002c0)=@chain) 06:30:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "c5c858"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'n'}]}}, &(0x7f0000000140)=""/234, 0x36, 0xea, 0x1}, 0x20) 06:30:39 executing program 0: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() setresuid(r0, 0x0, 0xee00) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x18}}], 0x18}, 0x0) 06:30:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) [ 872.991228] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) 06:30:39 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='projid_map\x00') write$FUSE_POLL(r0, 0x0, 0x0) 06:30:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000001700)=""/160, 0x3e, 0xa0, 0x1}, 0x20) [ 873.067906] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 873.107564] F2FS-fs (loop2): Unable to read 2th superblock 06:30:39 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000480)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:30:39 executing program 3: keyctl$chown(0x16, 0x0, 0xffffffffffffffff, 0x0) [ 873.134193] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) 06:30:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003c20000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 06:30:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x31}, 0x96, 0x0}, 0x0) 06:30:39 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8915, &(0x7f0000000440)={'wg1\x00'}) 06:30:39 executing program 0: setresuid(0x0, 0xee00, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) setresuid(r0, 0xee00, 0x0) 06:30:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x12000000}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:40 executing program 3: setresuid(0x0, 0xee00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:30:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x8}, 0x96, 0x0}, 0x0) 06:30:40 executing program 1: setresuid(0x0, 0xee00, 0x0) openat$random(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 06:30:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 06:30:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000027ff0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x7, r0, 0xee00, 0x0) 06:30:40 executing program 4: setresuid(0x0, 0xee00, 0x0) keyctl$chown(0x15, 0x0, 0xffffffffffffffff, 0x0) 06:30:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}}, &(0x7f00000002c0)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 06:30:40 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1a5eddd6539d46ff76a69b318038c42d0ec56014807c5096cc47674675bc3dd59bbd6c31ed8a9ffca72683916e0e48acf8d4d04a29bd8607f5d7e7eb45bfb1d397169cf4427cc6c5c9ece90209", 0x4d, 0xffffffffffffffff) 06:30:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000027fffffff0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@var={0x3, 0x0, 0x0, 0xe, 0x4}, @typedef={0x2}]}, {0x0, [0x0, 0x0, 0xc2, 0x61, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x3b, 0x1000, 0x1}, 0x20) 06:30:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0xfffffffffffffffe, &(0x7f0000000280)=""/191, 0x2, 0xbf, 0x1}, 0x20) 06:30:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x2041, 0x0) [ 873.703510] encrypted_key: master key parameter '' is invalid 06:30:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}], 0x18}}], 0x1, 0x0) 06:30:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000001940), 0x0, 0x0, 0x0, r0) 06:30:40 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rights={{0xc, 0x2}}], 0xc}, 0x0) 06:30:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000080)={&(0x7f0000000000), 0x7ffff000, &(0x7f0000000040)={0x0}, 0xd}, 0x0) 06:30:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x27}, 0x2}, 0x96, 0x0}, 0x0) 06:30:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000200010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x80, 0x0}, 0x0) 06:30:40 executing program 4: setresuid(0xee01, 0xee00, 0x0) setresuid(0x0, 0xffffffffffffffff, 0xee01) 06:30:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev}, 0x80, 0x0}, 0xf7ffff7f) 06:30:40 executing program 3: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000012c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 06:30:40 executing program 0: setresuid(0x0, 0xee00, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xee01) 06:30:40 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "b5c13830c48d48b33f485f9166d61508e2cac1d6e1988bd17de094f2abd41f51c2a2df032815a2585f943ebd406138133ba07675ce0de1019a09d6fee91c3757"}, 0x48, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, 0x0, 0x0) 06:30:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000300010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:40 executing program 5: io_setup(0xe7e, &(0x7f0000001580)=0x0) io_setup(0x101, &(0x7f00000003c0)=0x0) io_pgetevents(r1, 0x4, 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0, 0x0) io_setup(0xea7, &(0x7f00000001c0)=0x0) io_getevents(r2, 0x3, 0x3, &(0x7f0000000200)=[{}, {}, {}], 0x0) io_destroy(r0) 06:30:40 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8916, &(0x7f0000000440)={'wg1\x00'}) 06:30:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x2}, 0x96, 0x0}, 0x0) 06:30:40 executing program 1: setresuid(0x0, 0xee00, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 06:30:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x1}]}}, &(0x7f0000001300)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 06:30:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000400010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:41 executing program 1: socketpair(0x25, 0x3, 0x0, &(0x7f0000001480)) 06:30:41 executing program 4: setresuid(0x0, 0xee00, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000013"], 0x48}}, 0x0) 06:30:41 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)) 06:30:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1b, 0x5}, 0x48) 06:30:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x11, 0x8, &(0x7f0000001380)=@raw=[@func, @map_fd, @ldst, @exit, @jmp, @map_idx], &(0x7f00000000c0)='GPL\x00', 0x6, 0x83, &(0x7f00000001c0)=""/131, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:30:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, &(0x7f0000000440)={'wg1\x00'}) [ 874.474436] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 06:30:41 executing program 5: clock_getres(0x0, &(0x7f0000000140)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x8901, &(0x7f0000000000)) 06:30:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x82, &(0x7f00000000c0)=""/130, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:30:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000500010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x11}, 0x2}, 0x96, 0x0}, 0x0) 06:30:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @restrict]}}, &(0x7f0000001700)=""/160, 0x32, 0xa0, 0x1}, 0x20) 06:30:41 executing program 0: setresuid(0x0, 0xee00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:30:41 executing program 4: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() setresuid(0xffffffffffffffff, r0, 0x0) prctl$PR_GET_IO_FLUSHER(0x3a) 06:30:42 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000240)) 06:30:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x30}, 0x7}, 0x80, 0x0}, 0x0) 06:30:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:30:42 executing program 3: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() setresuid(r0, r0, 0x0) setresuid(0x0, 0x0, 0xee00) 06:30:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000600010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:42 executing program 4: setresuid(0x0, 0xee00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) 06:30:42 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rights={{0xc, 0x1, 0x4}}], 0xc}, 0x0) 06:30:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x1}, {0x10}, {}, {0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000900)=""/152, 0x52, 0x98, 0x1}, 0x20) 06:30:42 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8970, &(0x7f0000000440)={'wg1\x00'}) 06:30:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x1}, {0x10}, {}, {0x5}, {0x1, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000900)=""/152, 0x52, 0x98, 0x1}, 0x20) 06:30:42 executing program 4: syz_clone(0x80104000, 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)='b') 06:30:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000700010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:42 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @broadcast, @val, {@ipv6}}, 0x0) 06:30:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={0x0}, 0xd}, 0x0) 06:30:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000100)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 06:30:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev}, 0x80, 0x0}, 0x0) 06:30:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0xa}, 0x96, 0x0}, 0x0) 06:30:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000800010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x2000000b, &(0x7f00000001c0)={0x0}}, 0x0) 06:30:42 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000000c0)) 06:30:42 executing program 3: mount$fuse(0x2, 0x0, 0x0, 0x0, 0x0) 06:30:42 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x2, 0x1) write$FUSE_ATTR(r0, &(0x7f0000000100)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) 06:30:42 executing program 0: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0xa72044, 0x0) 06:30:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x96, 0x0}, 0x0) 06:30:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000900010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000280)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 06:30:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:42 executing program 1: setresuid(0x0, 0xee00, 0x0) setresuid(0xffffffffffffffff, 0xee01, 0xee00) 06:30:42 executing program 5: mount$fuse(0xf6ffffff, &(0x7f0000000040)='.\x00', 0x0, 0x241002, 0x0) 06:30:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5}, 0x48) 06:30:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000c00010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:42 executing program 0: setresuid(0x0, 0xee00, 0x0) init_module(0x0, 0x0, 0x0) 06:30:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast1, 0x7}, 0x80, 0x0}, 0x0) 06:30:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={{0x18, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x18}, 0x0) 06:30:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001380)={0x18, 0x3, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 06:30:42 executing program 4: setresuid(0x0, 0xee00, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 06:30:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @restrict]}}, &(0x7f0000001700)=""/160, 0x3e, 0xa0, 0x1}, 0x20) 06:30:42 executing program 5: setresuid(0x0, 0xee00, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)=':\x7f\x00', 0xfffffffffffffffe) 06:30:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @restrict]}}, &(0x7f0000001700)=""/160, 0x32, 0xa0, 0x1}, 0x20) 06:30:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002001000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xd, 0x1}]}]}}, &(0x7f0000000100)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 06:30:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001980)={&(0x7f0000000500), 0x8, &(0x7f0000001940)={&(0x7f0000000540)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x164, 0x8, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "8b75010125b3120781fff07ff892c21ac0b42c36b0440c41ce914f1839cb3903"}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "075d5e8233afd07b79cdc483a16d26482ebbafe7a6296b8fa90823b0945c5fa5"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xd44, 0x8, 0x0, 0x1, [{0x514, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x49c, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2a22d656d4c9ec0d542252cd9483261f2d065d2b23d68c8dbd5efd0e00d60f1e"}]}, {0x32c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @empty}}, @WGPEER_A_ALLOWEDIPS={0x2f4, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}, {0x188, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x17c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x378, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "fcf573d2c2b8642521d81afa3292f55c57423878146edfb00c5ce6ec53ab0500"}, @WGPEER_A_ALLOWEDIPS={0x350, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x4}]}]}]}]}, 0xec4}}, 0x0) 06:30:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x96, 0x0}, 0x0) 06:30:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@var={0x3, 0x0, 0x0, 0xe, 0x4}, @typedef={0x2}]}, {0x0, [0x0, 0xc2, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x39, 0x1000, 0x1}, 0x20) 06:30:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(r0, &(0x7f000000c640)={0x2020}, 0x207d) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:30:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002001300010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:43 executing program 4: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0xedc0, 0x0) 06:30:43 executing program 0: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() setresuid(r0, 0x0, 0x0) r1 = getuid() setresuid(r0, r1, r0) r2 = getuid() setresuid(r0, r2, r0) 06:30:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002400)='oom_adj\x00') write$FUSE_NOTIFY_INVAL_INODE(r0, 0x0, 0x0) 06:30:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x3}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002002300010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:43 executing program 0: openat$tun(0xffffff9c, &(0x7f0000000000), 0xe4000, 0x0) 06:30:43 executing program 4: mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 06:30:43 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = getpid() sendmsg$unix(r0, &(0x7f0000005600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005580)=[@cred={{0x18, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x18}, 0x0) 06:30:43 executing program 1: r0 = request_key(&(0x7f00000010c0)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='id_legacy\x00', r0) 06:30:43 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x2102) 06:30:43 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000001500)={[{@fat=@allow_utime}]}) 06:30:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xd86, 0x0) read$FUSE(r0, &(0x7f0000001300)={0x2020}, 0x2020) 06:30:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002004800010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:43 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@nl=@unspec, 0x80, 0x0}, 0xf7fb77bf) 06:30:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:30:43 executing program 4: setresuid(0x0, 0xee00, 0x0) openat$vcsu(0xffffff9c, &(0x7f0000000bc0), 0x0, 0x0) 06:30:43 executing program 0: setresuid(0x0, 0xee00, 0x0) socketpair(0x25, 0x0, 0x0, &(0x7f0000000040)) 06:30:43 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs, 0xfffffffffffffef5) 06:30:43 executing program 1: setresuid(0x0, 0xee00, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0x0) 06:30:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002004c00010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0xf401}, 0x96, 0x0}, 0x0) 06:30:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f00000013c0)=ANY=[@ANYBLOB="9feb010018000000000000007800000078000000080000000600000000000007"], &(0x7f00000012c0)=""/177, 0x98, 0xb1, 0x1}, 0x20) 06:30:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x2}]}, {0x0, [0x0, 0xc2]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 06:30:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @private2}, 0x80, 0x0}, 0x0) 06:30:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000001100)=[{{&(0x7f0000000000)=@abs, 0x6e, 0x0}}], 0x1, 0x0) 06:30:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002006800010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:44 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) 06:30:44 executing program 1: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() setresuid(r0, r0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = getpid() sendmsg$unix(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x18, 0x1, 0x2, {r2}}}], 0x18}, 0x0) 06:30:44 executing program 4: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000080)={0x0, "57ac27e575fdc239d96a362954c048a97e3fc64c312499166404ac12bf4f5cf0"}) 06:30:44 executing program 5: syz_open_dev$vim2m(&(0x7f0000000040), 0x6ee243a5, 0x2) 06:30:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001780)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001740)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) 06:30:44 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000440)={'wg1\x00'}) [ 877.857486] f2fs_msg: 105 callbacks suppressed [ 877.857500] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 6815746) [ 877.926074] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:30:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xb, &(0x7f00000001c0)={0x0}}, 0x0) 06:30:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0xc, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xde, &(0x7f0000000400)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:30:44 executing program 4: setresuid(0x0, 0xee00, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x18}, 0x0) [ 877.969346] F2FS-fs (loop2): Unable to read 2th superblock [ 878.004896] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 6815746) 06:30:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="140000000100000001000000e4"], 0x14}, 0x0) 06:30:44 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000440)={'wg1\x00'}) [ 878.040699] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 878.097419] F2FS-fs (loop2): Unable to read 2th superblock 06:30:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002006c00010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:44 executing program 0: r0 = openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000040)=0x4000000) 06:30:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f00000013c0)=ANY=[@ANYBLOB="9feb01001800000000000000780000007800000008000000060000000000000700000000000000000400000d0000000010000000050000000e000000000000b300000000000400000008000000010001000400000000000001000000005f007a01000000000100000d000000000f000000040000000f00000000000001000000005c006e01040000000000000c0400000000305f5f0061"], &(0x7f00000012c0)=""/177, 0x98, 0xb1, 0x1}, 0x20) 06:30:44 executing program 4: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000012c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 06:30:44 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40) 06:30:44 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) 06:30:45 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0x2, 0x0, 0x40000, @dev}, 0x80, 0x0}, 0xf7fb777e) 06:30:45 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0x2, 0x0, 0x0, @dev}, 0x80, 0x0}, 0xf7fb777e) 06:30:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0xf7fb777e) [ 878.329509] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 7077890) 06:30:45 executing program 5: r0 = openat$fuse(0xffffff9c, &(0x7f00000003c0), 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 06:30:45 executing program 1: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x1000000, 0x0) [ 878.372578] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 878.391851] F2FS-fs (loop2): Unable to read 2th superblock [ 878.405673] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 7077890) 06:30:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "b7fc8378d4eb72b92a38dfb3c4772aec2fa43fa204763671c63a4558e34da7cdc7032cf1f76d60b754dfb39b18e7eda2433e2a9b12189aefa2c880e88a43057a"}, 0x48, r0) 06:30:45 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002007400010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}]}}, &(0x7f0000000900)=""/152, 0x36, 0x98, 0x1}, 0x20) 06:30:45 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0xc0ed0000, 0x0) 06:30:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x68}, @restrict]}}, &(0x7f0000001700)=""/160, 0x32, 0xa0, 0x1}, 0x20) 06:30:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6c000000}]}}, &(0x7f0000001700)=""/160, 0x26, 0xa0, 0x1}, 0x20) 06:30:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000900)=""/152, 0x26, 0x98, 0x1}, 0x20) 06:30:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0xc}, 0x96, 0x0}, 0x0) 06:30:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8905, &(0x7f0000000440)={'wg1\x00'}) 06:30:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @restrict={0x0, 0x0, 0x0, 0xb, 0x2}]}}, &(0x7f0000001700)=""/160, 0x32, 0xa0, 0x1}, 0x20) 06:30:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0xfffffffffffffffe, &(0x7f0000000280)=""/191, 0x0, 0xbf, 0x1}, 0x20) 06:30:45 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002007a00010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:45 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 06:30:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1f6, 0x882) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0xb0, 0x0, 0x0, [{0x0, 0x0, 0x1, 0x0, '\x00'}, {0x0, 0x0, 0x1, 0x0, '\x00'}, {0x0, 0x0, 0xa, 0x0, '),{{,(\xca\'/]'}, {0x0, 0x0, 0x1, 0x0, '\x00'}, {}]}, 0xb0) 06:30:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000002c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 06:30:45 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x10021, 0x0, 0x0) 06:30:46 executing program 1: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() setresuid(r0, 0x0, 0xee00) 06:30:46 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200fe01010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0xe}, 0x96, 0x0}, 0x0) 06:30:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0xb}, 0x96, 0x0}, 0x0) 06:30:46 executing program 4: setresuid(0x0, 0xee00, 0x0) r0 = openat$random(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) 06:30:46 executing program 5: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x241000, 0x0) 06:30:46 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000480)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x46}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:30:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000100)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 06:30:46 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@var={0x3, 0x0, 0x0, 0xe, 0x4}, @typedef={0x2}]}, {0x0, [0x0, 0x0, 0xc2]}}, &(0x7f0000000280)=""/4096, 0x39, 0x1000, 0x1}, 0x20) 06:30:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "b7fc8378d4eb72b92a38dfb3c4772aec2fa43fa204763671c63a4558e34da7cdc7032cf1f76d60b754dfb39b18e7eda2433e2a9b12189aefa2c880e88a43057a"}, 0x48, r0) keyctl$unlink(0x16, 0x0, r1) 06:30:46 executing program 0: request_key(&(0x7f00000010c0)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:30:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000001700)=""/160, 0x32, 0xa0, 0x1}, 0x20) 06:30:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) write$FUSE_ATTR(r0, 0x0, 0x0) 06:30:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0xd}, 0x96, 0x0}, 0x0) 06:30:46 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0xf7fb777e) 06:30:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x2b}, 0x96, 0x0}, 0x0) 06:30:46 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008203010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001980)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001940)={&(0x7f0000000540)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x164, 0x8, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "8b75010125b3120781fff07ff892c21ac0b42c36b0440c41ce914f1839cb3903"}, @WGPEER_A_ALLOWEDIPS={0x5c, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @mcast2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "075d5e8233afd07b79cdc483a16d26482ebbafe7a6296b8fa90823b0945c5fa5"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xd44, 0x8, 0x0, 0x1, [{0x514, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x49c, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2a22d656d4c9ec0d542252cd9483261f2d065d2b23d68c8dbd5efd0e00d60f1e"}]}, {0x32c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @empty}}, @WGPEER_A_ALLOWEDIPS={0x2f4, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}]}, {0x188, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x17c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x378, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "fcf573d2c2b8642521d81afa3292f55c57423878146edfb00c5ce6ec53ab0500"}, @WGPEER_A_ALLOWEDIPS={0x350, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x4}]}]}]}]}, 0xec4}}, 0x0) 06:30:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@var={0x3, 0x0, 0x0, 0xe, 0x4}, @typedef={0x2}]}, {0x0, [0x0, 0xc2, 0x61, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 06:30:46 executing program 0: setresuid(0x0, 0xee00, 0x0) add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) setresuid(0x0, 0x0, 0x0) 06:30:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x20040001) 06:30:46 executing program 3: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000012c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 06:30:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x80, 0x0}, 0x0) 06:30:46 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008503010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:46 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8912, &(0x7f0000000440)={'wg1\x00'}) 06:30:46 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getpid() sendmsg$unix(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r0, r0]}}], 0x14}, 0x0) 06:30:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x3}, @restrict]}}, &(0x7f0000001700)=""/160, 0x32, 0xa0, 0x1}, 0x20) 06:30:46 executing program 3: mount$fuse(0xf6ffffff, &(0x7f0000000040)='.\x00', 0x0, 0x241000, 0x0) 06:30:46 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 06:30:46 executing program 4: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0xf0ffff, 0x0) 06:30:46 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008603010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:46 executing program 5: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() setresuid(r0, 0x0, 0x0) setresuid(r0, 0x0, 0xee00) 06:30:46 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5411, &(0x7f0000000440)={'wg1\x00'}) 06:30:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 06:30:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="1a", 0x1, r0) add_key(&(0x7f00000001c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) 06:30:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x9b0, 0x4ab1268f, 0x0, 0x1}, 0x48) 06:30:46 executing program 5: syz_clone(0x50040100, 0x0, 0xfffffe3a, 0x0, 0x0, 0x0) 06:30:46 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008703010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:46 executing program 3: mount(0x0, 0x0, &(0x7f00000002c0)='nfs4\x00', 0x0, &(0x7f0000000300)='%#([\x00') 06:30:47 executing program 0: sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000240)) 06:30:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev}, 0x80, 0x0}, 0xffffff7f) 06:30:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@typedef={0x2}]}, {0x0, [0x0, 0xc2, 0x61, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 06:30:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f0000000040)={0x0}}, 0x0) [ 880.444096] IPVS: ftp: loaded support on port[0] = 21 06:30:47 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008803010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:47 executing program 0: openat$tun(0xffffff9c, &(0x7f0000000000), 0x26801, 0x0) 06:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa}, {0xd, 0x1}]}]}}, &(0x7f0000000100)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 06:30:47 executing program 4: setresuid(0x0, 0xee00, 0x0) syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x2}]}, {0x0, [0x0, 0x5f, 0x2e]}}, &(0x7f0000001700)=""/160, 0x29, 0xa0, 0x1}, 0x20) 06:30:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}]}}, &(0x7f0000001700)=""/160, 0x32, 0xa0, 0x1}, 0x20) 06:30:47 executing program 1: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0xf0, 0x0) 06:30:47 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008903010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:47 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000005600)={0x0, 0x0, 0x0}, 0x0) 06:30:47 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x894b, 0x0) 06:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000017c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1}, {}]}]}}, &(0x7f0000001700)=""/160, 0x3e, 0xa0, 0x1}, 0x20) 06:30:47 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x56c5e3db58acd71e) 06:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1}]}}, &(0x7f00000002c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 06:30:47 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008a03010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:47 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1f6, 0x882) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x10}, 0x10) 06:30:47 executing program 0: setresuid(0x0, 0xee00, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) setresuid(0x0, r0, 0x0) 06:30:47 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8934, &(0x7f0000000440)={'wg1\x00'}) 06:30:47 executing program 3: openat$vcsu(0xffffff9c, &(0x7f0000000bc0), 0x0, 0x0) openat$vcsu(0xffffff9c, &(0x7f0000000bc0), 0x0, 0x0) openat$vcsu(0xffffff9c, &(0x7f0000000bc0), 0x0, 0x0) openat$vcsu(0xffffff9c, &(0x7f0000000bc0), 0x200802, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000180)={0x7f}, 0x0, 0x0, 0x0) 06:30:47 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xffff, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="46b8cfa3bc96295135", 0x9, 0x8}], 0x0, &(0x7f0000000280)=ANY=[]) 06:30:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x894b, &(0x7f0000000440)={'wg1\x00'}) 06:30:47 executing program 5: r0 = openat$cuse(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000002540)={0xa4, 0x3, 0x0, {0x0, 0x37, 0x0, '\xe1\x8a9\xbb\x80\a\xd1\x9c\xf4\xbc\xa5\x14X\xed\xb8\xd2:)\xa8\x17\x83)\xebS7\x87Rn\xbaQ\x86\'\'\x05)3\xd3*V\xccB`\x16\xe6\x93\x13\xf0\xd2\x8d\v\xe0\r\xf3)N\x0f\x11\x92\xf3\xad;\x04W\x8bS\xd9\xf4E\xcas1\x97i\x9c\xd9\x80\x98}\aM1\x05H\xe5\x15\xfbG\xf2\xdd\xdcj\x95Z_\x8fSw\xec\xbf\x95\xee^\x90\x8dI\xca\xfd\xae\x87\xd6\xd7I\nv\xab\x98*\xb0Y\xa6\x83.\xb6\f\xf0\xcf\x04\x9c\x0f\xce\x86'}}, 0xa4) 06:30:47 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002008b03010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000001100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:30:47 executing program 3: setresuid(0xee01, 0xee01, 0x0) 06:30:47 executing program 0: setresuid(0x0, 0xee00, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x16, r0, 0xee00, 0x0) 06:30:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x2a}, 0x96, 0x0}, 0x0) 06:30:47 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(r1, 0xee00, 0xee01) 06:30:47 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200c203010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:48 executing program 4: setresuid(0x0, 0xee00, 0x0) openat$vcsu(0xffffff9c, &(0x7f0000000bc0), 0x200802, 0x0) 06:30:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x96, 0x0}, 0x0) 06:30:48 executing program 1: r0 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xffff, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="46b8cfa3bc962951351648ac4aed4a8f8040f21ccd7a5e5b4c591e15c4c18460ee9f3cc3dafdb6f1824cedf42d68f407d8fc563f7e2ed050756b08609706e03e145028627a43ee04f377e618bf00be02e329430fc4d6e381e7e78f48bb76", 0x5e, 0x8}], 0x0, &(0x7f0000000280)=ANY=[@ANYRES64=0x0]) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_BTF_LOAD(0x2, &(0x7f00000012c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000020000000000280b4da37217a63ded8427c9bcbcca893335017fec099b29e83c3e94ad8869f8ae2b536ba0184d9ce1f233ca3e20b37aa13f057a"], 0x0, 0x1a}, 0x20) 06:30:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x29}, 0x96, 0x0}, 0x0) 06:30:48 executing program 5: setresuid(0x0, 0xee00, 0x0) keyctl$chown(0x12, 0x0, 0xffffffffffffffff, 0x0) 06:30:48 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8927, &(0x7f0000000440)={'wg1\x00'}) 06:30:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x10}}, 0x96, 0x0}, 0x0) 06:30:48 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xffff, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="46b8cfa3bc9629", 0x7, 0x8}], 0x0, &(0x7f0000000280)=ANY=[]) 06:30:48 executing program 5: r0 = syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_clone(0x8004000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 06:30:48 executing program 0: setresuid(0x0, 0xee00, 0x0) syz_clone(0x90000c00, 0x0, 0x0, 0x0, 0x0, 0x0) 06:30:48 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200e603010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:48 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = getpid() sendmsg$unix(r0, &(0x7f0000005600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005580)=[@cred={{0x18, 0x1, 0x2, {r1, 0x0, 0xee01}}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x30}, 0x0) 06:30:48 executing program 4: syz_clone(0x20180000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)='1') 06:30:48 executing program 0: setresuid(0x0, 0xee00, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) 06:30:48 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000005010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:48 executing program 3: setresuid(0x0, 0xee00, 0xee01) setresuid(0x0, 0x0, 0xee01) 06:30:48 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "1a36e6f722a9bd4a4a9acb47bb48e7aeabc2bfb30e7670e811f1fd819ddbc19cb666b466ab069c49e197f0e2a807b5749b1a6d2cbf4be13ede5df97081f9094e"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0xee00) 06:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f00000013c0)=ANY=[@ANYBLOB="9feb01001800000000000000780000007800000008000000060000000000000700000000000000000400000d0000000010000000050000000e000000000000b300000000000400000008000000010001000400000000000001000000005f007a01000000000100000d000000000f000000040000000f00000000000001000000005c006e01040000000000000c0400000000305f5f006145"], &(0x7f00000012c0)=""/177, 0x98, 0xb1, 0x1}, 0x20) 06:30:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb, 0x0, 0x0, 0x40000000}, 0x48) 06:30:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/144, 0x29, 0x90, 0x1}, 0x20) 06:30:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0xfffffff5}, 0x96, 0x0}, 0x0) 06:30:48 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000006010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x0) 06:30:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev, 0x6}, 0x80, 0x0}, 0xf7ffff7f) 06:30:48 executing program 5: setresuid(0x0, 0xee00, 0x0) keyctl$chown(0x7, 0x0, 0xee00, 0x0) 06:30:48 executing program 4: setresuid(0x0, 0xee00, 0x0) add_key$keyring(&(0x7f0000002080), &(0x7f00000020c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 06:30:48 executing program 3: syz_clone(0x20180000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:30:48 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000007010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:48 executing program 1: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000bc0), 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rights={{0x14, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x14}, 0x0) 06:30:48 executing program 3: setresuid(0x0, 0xee00, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 06:30:48 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1fb1) 06:30:48 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) 06:30:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x13, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:30:48 executing program 3: socketpair(0x3, 0x0, 0x0, &(0x7f0000002380)) 06:30:48 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000009010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:49 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x400c1) 06:30:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x0) 06:30:49 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 06:30:49 executing program 4: r0 = socket(0x18, 0x0, 0x2) accept$nfc_llcp(r0, 0x0, 0x0) 06:30:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x2042) 06:30:49 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x20, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}]}, 0x20}}, 0x0) 06:30:49 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000c010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:49 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000bc0)='.log\x00', 0x14040, 0x0) 06:30:49 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0, 0x0, 0x0) symlinkat(&(0x7f0000004a00)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000004a40)='./file1\x00') syz_mount_image$nfs4(&(0x7f00000046c0), &(0x7f0000004700)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004900)={[{'-'}, {}, {'[]#('}, {'%'}], [{@appraise}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_gt}, {@dont_measure}, {@euid_lt}]}) 06:30:49 executing program 4: setitimer(0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0xea60}}, 0x0) 06:30:49 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$dsp(r0, &(0x7f0000000080)='J', 0x1) 06:30:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x24}}, 0x0) 06:30:49 executing program 4: symlinkat(&(0x7f0000004a00)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000004a40)='./file1\x00') syz_mount_image$nfs4(0x0, &(0x7f00000044c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000046c0), &(0x7f0000004700)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004900)) 06:30:49 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000240)={0x24, @long}, 0x14) 06:30:49 executing program 5: add_key$user(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ef", 0x1, 0xffffffffffffffff) 06:30:49 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000013010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x28, r1, 0x21, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}]}, 0x28}}, 0x0) 06:30:49 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x401, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000023c0)={0xa0}, 0xa0) 06:30:49 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 06:30:49 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, r1, 0x21, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x34}}, 0x0) [ 882.872902] f2fs_msg: 116 callbacks suppressed [ 882.872916] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 318767106) 06:30:49 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffa) [ 882.962609] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:30:49 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f0000004100)={0x20, 0x0, r1}, 0x20) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000440)={0x10, 0x0, r1}, 0x10) [ 883.010165] F2FS-fs (loop2): Unable to read 2th superblock [ 883.043134] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 318767106) [ 883.090619] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 883.138767] F2FS-fs (loop2): Unable to read 2th superblock 06:30:50 executing program 3: syz_open_procfs$userns(0x0, 0x0) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 06:30:50 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, "ccd2a308000000000000000100", "dce84b2a09e5c200e6000000007100"}) 06:30:50 executing program 1: syz_open_dev$vcsa(&(0x7f0000000200), 0x4, 0x0) 06:30:50 executing program 4: setitimer(0x0, &(0x7f0000000280)={{0x0, 0x2710}, {0x77359400}}, 0x0) setitimer(0x0, 0x0, &(0x7f0000000300)) 06:30:50 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000020010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, r1, 0x20b, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_FAMILY={0x6}]}, 0x24}}, 0x0) 06:30:50 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f00000021c0), 0x9ac86b00b2dd7fbe, 0x0) 06:30:50 executing program 5: syz_mount_image$ufs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2201004, &(0x7f00000041c0)) 06:30:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0500613cce05f697bd7430"], 0x28}}, 0x0) 06:30:50 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) [ 883.491316] syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 06:30:50 executing program 4: pipe2(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$khugepaged_scan(r0, 0x0, 0x0) [ 883.538324] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 536870914) [ 883.600701] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:30:50 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/kernel/profiling', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x1d}, 0x0, 0x0, 0x0) 06:30:50 executing program 0: mount$fuseblk(&(0x7f0000002440), &(0x7f0000002480)='./file0/file0\x00', &(0x7f00000024c0), 0x0, &(0x7f00000025c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}}) 06:30:50 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x2c, r1, 0x21, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}]}, 0x2c}}, 0x0) 06:30:50 executing program 4: fanotify_init(0x490f96717a650e63, 0x0) [ 883.649606] F2FS-fs (loop2): Unable to read 2th superblock [ 883.681651] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 883.689703] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 536870914) 06:30:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 06:30:50 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000023010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:50 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x40, r1, 0x21, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x40}}, 0x0) 06:30:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000340), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev}]}, 0x1c}}, 0x0) 06:30:50 executing program 0: openat$sysfs(0xffffffffffffff9c, 0x0, 0x450000, 0x0) 06:30:50 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x401, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) 06:30:50 executing program 1: r0 = gettid() migrate_pages(r0, 0x1ff, 0x0, &(0x7f0000000140)) 06:30:50 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x101, "44889d5eff3e06b47b611efd2033a9e1bf529b8a68509594fc32cc95494ee79a"}) 06:30:50 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002009326010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:50 executing program 4: syz_mount_image$ufs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f00000041c0)) 06:30:50 executing program 1: add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="d2", 0x1, 0xfffffffffffffffc) 06:30:50 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f0000000280)='.pending_reads\x00', 0x0, 0x0) 06:30:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'veth1_macvtap\x00', {0x2, 0x0, @rand_addr=0x64010100}}) 06:30:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) 06:30:50 executing program 1: clock_adjtime(0x0, &(0x7f0000000180)={0xff, 0x0, 0x0, 0x0, 0x0, 0x9}) 06:30:50 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) 06:30:50 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0xe4800, 0x0) 06:30:50 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 06:30:50 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000440)={0x2, 0x0, @loopback}, 0x10) 06:30:51 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002009426010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:51 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 06:30:51 executing program 3: syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x103000) 06:30:51 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 06:30:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540), 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000f40)={&(0x7f0000000e80), 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x28, 0x2, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FLAGS={0x8}, @NFACCT_PKTS={0xc}]}, 0x28}}, 0x0) 06:30:51 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x1d}, 0x0, &(0x7f00000001c0)={r0}, 0x0) 06:30:51 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002009d26010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:51 executing program 1: select(0xfffffed2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x2710}) 06:30:51 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x400c0) 06:30:51 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_PAN_ID={0x6}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x0) 06:30:51 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)={'nhpoly1305-avx2\x00'}}) 06:30:51 executing program 0: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x1, 0x8000000, 0xffffffffffffffff, 0x0) 06:30:51 executing program 1: r0 = socket(0x2, 0x3, 0x40) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, 0x0, 0x0) 06:30:51 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200ab26010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:51 executing program 5: clock_adjtime(0x0, &(0x7f0000000180)={0xff}) 06:30:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, 0x0, 0x0) 06:30:51 executing program 3: io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) pipe2(&(0x7f0000000a40)={0xffffffffffffffff}, 0x0) io_submit(r0, 0x1, &(0x7f0000002240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xd, 0x0, r1, 0x0}]) 06:30:51 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_PAGE={0x5}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000900000008000300", @ANYRES32=r2], 0x24}}, 0x0) [ 884.871283] could not allocate digest TFM handle nhpoly1305-avx2 06:30:51 executing program 1: syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) 06:30:51 executing program 5: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) setitimer(0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) 06:30:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000080)) 06:30:51 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200003f010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:51 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 06:30:51 executing program 3: clock_getres(0x0, &(0x7f00000000c0)) 06:30:51 executing program 5: timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={&(0x7f00000006c0)="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", 0x0}}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) 06:30:51 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x10000, 0x0) openat$incfs(r0, &(0x7f0000000bc0)='.log\x00', 0x14000, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x3, 0x0}, 0x8) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x18}, 0xc) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x10000, 0x0) openat$incfs(r3, &(0x7f0000000bc0)='.log\x00', 0x14000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x26}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xbf5}, @exit, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0xb}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0xff, 0xe5, &(0x7f00000001c0)=""/229, 0x40f00, 0x8, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xa, 0x8, 0x101}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r2, r3, 0xffffffffffffffff]}, 0x80) r4 = socket(0x11, 0x3, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r6, 0x10f, 0x81, &(0x7f0000004740), 0x4) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r6, 0x8982, &(0x7f00000004c0)={0x1, 'vlan0\x00', {}, 0x8}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x10000, 0x0) openat$incfs(r7, &(0x7f0000000bc0)='.log\x00', 0x14000, 0x0) ioctl$TUNSETVNETHDRSZ(r7, 0x400454d8, &(0x7f0000000500)=0x5b8) setsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000004740), 0x4) setsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000480)={0x0, 0x80000001}, 0x8) accept(r4, &(0x7f0000000000)=@nl=@proc, &(0x7f0000000080)=0x80) 06:30:51 executing program 0: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b13fd98d"}}) 06:30:51 executing program 3: userfaultfd(0x80001) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) 06:30:51 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000440)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)=""/199, 0xc7}], 0x1}, 0x0) 06:30:51 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000040010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:51 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, 0x0) 06:30:52 executing program 0: fanotify_mark(0xffffffffffffffff, 0x153, 0x0, 0xffffffffffffffff, 0x0) 06:30:52 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) fanotify_mark(r0, 0x41, 0x4000000a, 0xffffffffffffffff, 0x0) 06:30:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 06:30:52 executing program 5: getgroups(0x1, &(0x7f00000001c0)=[0x0]) 06:30:52 executing program 0: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x0, "44889d5eff3e06b47b611efd2033a9e1bf529b8a68509594fc32cc95494ee79a"}) 06:30:52 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000048010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 06:30:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 06:30:52 executing program 4: socket(0x11, 0xa, 0x9) 06:30:52 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), &(0x7f0000000080)=0x4) 06:30:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 06:30:52 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200004c010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:52 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x3c) 06:30:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:30:52 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 06:30:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="17000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000f"], 0x28}}, 0x0) 06:30:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@private}, @sadb_ident={0x2, 0xb}, @sadb_x_sec_ctx={0x1}]}, 0x50}}, 0x0) 06:30:52 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000068010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, 0xfffffffffffffffd, 0x0) 06:30:52 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_gettime(0x0, 0x0) 06:30:52 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000900000008000100", @ANYRES32, @ANYBLOB="0c000600000000000000000005000800110000000500080005000000050007000900000008000300", @ANYRES32=r3], 0x60}}, 0x0) 06:30:52 executing program 1: socket(0x1e, 0x0, 0x623) [ 886.198621] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 06:30:52 executing program 0: syz_mount_image$nfs4(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1d5ecc4661a1ecd1, &(0x7f0000000b00)) 06:30:52 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000140)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) 06:30:52 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200006c010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:53 executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000000)=""/20, 0x14) [ 886.314237] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 06:30:53 executing program 3: io_setup(0x1, &(0x7f00000001c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x77359400}) 06:30:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:30:53 executing program 0: sigaltstack(&(0x7f0000000040)={0x0, 0x2}, 0x0) 06:30:53 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, 0x0, &(0x7f0000000240)) 06:30:53 executing program 0: r0 = socket(0x18, 0x0, 0x0) connect$tipc(r0, 0x0, 0x0) 06:30:53 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) 06:30:53 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000074010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x14, 0x2, 0x7, 0x101}, 0x14}}, 0x0) 06:30:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 06:30:53 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x1d}, 0x0, 0x0, 0x0) 06:30:53 executing program 5: select(0x15, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x2710}) 06:30:54 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 06:30:54 executing program 1: socketpair(0x22, 0x0, 0x0, 0x0) 06:30:54 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 06:30:54 executing program 0: io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:30:54 executing program 5: semctl$SETVAL(0x0, 0x0, 0x10, 0xfffffffffffffffe) 06:30:54 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200007a010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:54 executing program 1: syz_mount_image$hfsplus(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)={[{@barrier}, {@uid={'uid', 0x3d, 0xee01}}, {@session}, {@umask}, {@nobarrier}, {@creator={'creator', 0x3d, "b193ae7e"}}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) 06:30:54 executing program 5: io_setup(0x2, &(0x7f0000000080)) io_setup(0x0, &(0x7f0000000080)) 06:30:54 executing program 0: r0 = socket(0x18, 0x0, 0x1) sendmsg$rds(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) 06:30:54 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') 06:30:54 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={'hmac(sha256-neon)\x00'}}) 06:30:54 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000382010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x6c, r1, 0x21, 0x0, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40040}, 0x4884) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0, 'syz0\x00'}) 06:30:54 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$can_bcm(r0, 0x0, 0x0) 06:30:54 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}}, 0x0) 06:30:54 executing program 5: r0 = socket(0x18, 0x0, 0x1) connect$tipc(r0, 0x0, 0x0) 06:30:54 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000385010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:54 executing program 0: add_key$user(&(0x7f0000000500), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='i', 0x1, 0xffffffffffffffff) 06:30:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) 06:30:54 executing program 1: io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 887.758258] could not allocate digest TFM handle hmac(sha256-neon) 06:30:54 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x1c, r1, 0x25, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}]}, 0x1c}}, 0x0) 06:30:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r2, 0x311}, 0x14}}, 0x0) 06:30:54 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, &(0x7f0000000080)) [ 887.893280] f2fs_msg: 86 callbacks suppressed [ 887.893294] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 2231566338) 06:30:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 06:30:54 executing program 1: accept$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getresgid(&(0x7f0000002500), &(0x7f0000002540), &(0x7f0000002580)) [ 887.943808] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 887.973311] F2FS-fs (loop2): Unable to read 2th superblock 06:30:54 executing program 5: add_key$user(&(0x7f0000000100), 0x0, &(0x7f0000002bc0)="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", 0x1001, 0x0) 06:30:54 executing program 4: clock_adjtime(0x0, &(0x7f0000000180)={0xff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x800, 0x8, 0x3, 0x9, 0x8, 0xfffffffffffffcd2, 0x7fffffffffffffff, 0x2, 0x8, 0xffff, 0x400000000000000, 0x1000, 0x1, 0x6, 0x6, 0x0, 0x4, 0x5}) 06:30:54 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000440)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000240)=[{0x0}, {0x0}, {&(0x7f0000000100)=""/199, 0xc7}], 0x3}, 0x0) [ 888.004508] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 2231566338) [ 888.039225] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 888.081504] F2FS-fs (loop2): Unable to read 2th superblock 06:30:54 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000386010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:54 executing program 3: syslog(0x3, &(0x7f0000000000)=""/77, 0x4d) 06:30:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 06:30:54 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) 06:30:54 executing program 5: io_setup(0xfffffff9, &(0x7f0000000040)) 06:30:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r1, 0x121, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PAGE={0x5}, @NL802154_ATTR_CHANNEL={0x5}]}, 0x2c}}, 0x0) 06:30:55 executing program 5: socketpair(0x1, 0x0, 0x3bc, 0x0) 06:30:55 executing program 1: add_key$user(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="c1", 0x1, 0xffffffffffffffff) 06:30:55 executing program 0: openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:30:55 executing program 4: r0 = socket(0x11, 0x3, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40000022) [ 888.318891] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 2248343554) 06:30:55 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) connect$caif(r0, &(0x7f0000000080)=@dgm, 0x18) [ 888.394879] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:30:55 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x22) [ 888.440396] F2FS-fs (loop2): Unable to read 2th superblock [ 888.465186] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 2248343554) 06:30:55 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, 0x0) 06:30:55 executing program 4: socket(0x15, 0x5, 0x1ff) 06:30:55 executing program 3: io_setup(0x8, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_destroy(r0) 06:30:55 executing program 1: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/76) 06:30:55 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000387010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:55 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, 0x0) 06:30:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 06:30:55 executing program 0: syslog(0x4, &(0x7f00000004c0)=""/97, 0x61) 06:30:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000f40)={0x0, 0x0, 0x0}, 0x0) 06:30:55 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d0e, &(0x7f0000000080)) 06:30:55 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x800, 0x0, &(0x7f0000000480)) 06:30:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000d00)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:30:55 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000388010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:55 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000080)=0x4) 06:30:55 executing program 1: getgroups(0x3ffffffffffffe09, &(0x7f00000021c0)) 06:30:55 executing program 4: mq_unlink(&(0x7f0000000080)='\"\xfc\x1eK-\xab') 06:30:55 executing program 3: r0 = socket(0x18, 0x0, 0x1) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, 0x0, 0x0) 06:30:55 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}}, &(0x7f0000000380)) 06:30:55 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000389010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:55 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) bind$vsock_dgram(r0, &(0x7f0000002100)={0x28, 0x0, 0x0, @my=0x1}, 0x10) 06:30:55 executing program 3: migrate_pages(0x0, 0x8, 0x0, &(0x7f00000000c0)=0xb48) 06:30:55 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 06:30:55 executing program 5: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffa000/0x3000)=nil) 06:30:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="10020000", @ANYRES16=r1, @ANYBLOB="01002bbd7000ffdbdf2518"], 0x210}}, 0x0) 06:30:55 executing program 0: semtimedop(0x0, &(0x7f0000006380)=[{0x0, 0x6}], 0x1, &(0x7f0000006400)) 06:30:55 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200038a010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:55 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) 06:30:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0xfffffffffffffffc, 0xe, 0x0}, 0x0) 06:30:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 889.228892] netlink: 508 bytes leftover after parsing attributes in process `syz-executor.4'. 06:30:55 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_PAGE={0x5}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x2c}}, 0x0) 06:30:55 executing program 3: r0 = socket(0x18, 0x0, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 06:30:56 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200038b010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:56 executing program 4: io_setup(0x10001, &(0x7f0000000040)) 06:30:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffc}, 0x0) 06:30:56 executing program 5: socketpair(0x0, 0x80d, 0x0, 0x0) 06:30:56 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x20}}, 0x0) 06:30:56 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f0000000240)=@l2={0x1f, 0x8, @none}, 0x80, 0x0}}], 0x1, 0x0) 06:30:56 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg$nfc_llcp(r0, 0x0, 0x0, 0x0) 06:30:56 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002002693010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:56 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 06:30:56 executing program 5: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x1, 0x8000000, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 06:30:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x20, r1, 0x21, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}]}, 0x20}}, 0x0) 06:30:56 executing program 3: syz_mount_image$minix(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0xa5ee}], 0x0, &(0x7f00000003c0)) 06:30:56 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000140), 0x4) 06:30:56 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) 06:30:56 executing program 5: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, 0x0) 06:30:56 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002002694010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:56 executing program 1: openat$mice(0xffffffffffffff9c, &(0x7f0000001080), 0x44500) 06:30:56 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) 06:30:56 executing program 5: msgsnd(0x0, &(0x7f0000000540), 0x8, 0x0) 06:30:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 06:30:56 executing program 4: socketpair(0x22, 0x0, 0x1000, 0x0) [ 889.797314] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. 06:30:56 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200269d010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), r0) 06:30:56 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_loaded', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 06:30:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 06:30:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x48) 06:30:56 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000280)={0x20, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 06:30:56 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000002200), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 06:30:56 executing program 3: socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0, 0x0) 06:30:56 executing program 5: getgroups(0x1, &(0x7f00000001c0)=[0x0]) time(&(0x7f0000000000)) 06:30:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000001240)) 06:30:56 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020026ab010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:56 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0x7, 0x4) 06:30:56 executing program 1: socketpair(0x3, 0x0, 0x200, 0x0) 06:30:56 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x44500) 06:30:56 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f0000000000)) 06:30:56 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/class/raid_devices', 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') 06:30:57 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x40049409, 0x0) 06:30:57 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020003c2010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:57 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x1d}, 0x0, 0x0, 0x0) 06:30:57 executing program 0: syz_mount_image$hfsplus(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)) 06:30:57 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x4, 0x0) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 06:30:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)) 06:30:57 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 06:30:57 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000480)=@file={0x1, './file1/file0\x00'}, 0x6e) 06:30:57 executing program 0: syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x25080, &(0x7f0000000380)=ANY=[]) 06:30:57 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020003e6010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:57 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r0, 0x0, 0x0) 06:30:57 executing program 1: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETPF(r0, 0x7a9, 0x0) 06:30:57 executing program 5: r0 = socket(0x18, 0x0, 0x1) ioctl$SIOCGETLINKNAME(r0, 0x89e0, 0x0) 06:30:57 executing program 0: openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0), 0x0) 06:30:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:30:57 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020001fe010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100), r1) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 06:30:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000dc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000067"], 0x28}}, 0x0) 06:30:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) 06:30:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000dc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000080)={0x20, r1, 0x711, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 890.864623] nbd: must specify at least one socket 06:30:57 executing program 5: pipe2(&(0x7f0000000a40), 0x0) select(0x40, &(0x7f0000000480)={0x8}, 0x0, 0x0, &(0x7f0000000580)) 06:30:57 executing program 4: socket(0x2, 0x0, 0x6ff) 06:30:57 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000fff010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 890.888966] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 06:30:57 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 06:30:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100), r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}]}, 0x1c}}, 0x0) 06:30:57 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id={0x1e, 0x3, 0x0, {0x0, 0x3}}, 0x10) 06:30:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}}, 0x0) 06:30:57 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f00000014c0)={&(0x7f0000000080), 0x6e, &(0x7f0000001440)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:30:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000f40)={&(0x7f0000000e80), 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x28, 0x2, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FLAGS={0x8}, @NFACCT_PKTS={0xc}]}, 0x28}}, 0x0) [ 891.103854] nbd: must specify an index to disconnect 06:30:57 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000040000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:57 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:30:57 executing program 0: socket(0x1d, 0x0, 0xf7b) 06:30:57 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000040)) 06:30:57 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0x801c581f, 0x0) 06:30:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x0, 0x1}) 06:30:58 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f0000000140)={0x5c16, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 891.314003] attempt to access beyond end of device 06:30:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 891.337448] loop2: rw=12288, want=8200, limit=12 [ 891.369674] attempt to access beyond end of device 06:30:58 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x101000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000fec000/0x12000)=nil, 0x12000, 0x0, 0x10, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0x8001, 0x3e, 0x1ff, 0x7, 0x7ff, 0xffffffffffffffff}) socket(0x1, 0x2, 0x0) 06:30:58 executing program 1: mkdir(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc2}) chdir(&(0x7f00000001c0)='./bus\x00') setxattr$incfs_metadata(&(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0) [ 891.400529] loop2: rw=12288, want=12296, limit=12 [ 891.418374] attempt to access beyond end of device 06:30:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='westwood\x00', 0x9) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000001940)='}', 0x1, 0x0, 0x0, 0x0) [ 891.460997] loop2: rw=12288, want=8200, limit=12 06:30:58 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket(0x0, 0x0, 0x2) [ 891.487020] attempt to access beyond end of device [ 891.505144] loop2: rw=12288, want=12296, limit=12 06:30:58 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000000300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:58 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) 06:30:58 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb, 0xc26de6266960579) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200200c050000800500000002000020d3"]) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, 0x0) 06:30:58 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {}, {0x746, 0x59}, {}, {0x0, 0x401, 0x1}, 0x0, 0x80, 0x0, 0xfffff470, 0x0, 0x2, 0x4, 0x1000, 0x5, 0x0, 0x5, 0x988c, 0x20, 0x2, 0x2, 0x6}) 06:30:58 executing program 4: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), 0xffffffffffffffff) 06:30:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, 0x0) 06:30:58 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0), 0xfff, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000200)) 06:30:58 executing program 1: syz_open_dev$media(&(0x7f00000008c0), 0x0, 0x0) [ 891.667180] usb usb1: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. 06:30:58 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000000400000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)) 06:30:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'erspan0\x00', 0x0}) 06:30:59 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {}, {0x746, 0x59}, {}, {0x0, 0x401, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 06:30:59 executing program 5: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) 06:30:59 executing program 3: ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000001c0)) 06:30:59 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000001f00000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:59 executing program 1: mkdir(&(0x7f0000002000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002280)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002180)=ANY=[@ANYBLOB="280000000400000000000000000000000000000000000000fd0f0000000000000000000000000000778a747da3f52950a875bd3f032977f429394e8fe0fad6c366a4765b9e7bf806345110896dd442ae3a619881de9f62d638ee65e9e1add2d205bb76f1711a13a56df825b0c83287ae541adbc08754134f15e21693f53ab4e2b5f8f345e2cc4a42519bd01fd41010a45f4cd5cf54b3963a32da4abf6fa6da46d5562a952a59b7f320bb29466a6728d14967407594fc322db8af08d8c5db61656e4cd328336c10b72400bbf0babc20013d0f4d4f36fea8a2f441f0d789e708a60000000000"], 0x28) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r2, r3, 0x0, 0x10000) openat(0xffffffffffffffff, &(0x7f0000002140)='./file0/file0\x00', 0x20000, 0x142) lseek(0xffffffffffffffff, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[], 0x208e24b) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) ioctl$KDSETLED(0xffffffffffffffff, 0x6, 0x0) 06:30:59 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 06:30:59 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x80d00, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 06:30:59 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x1, @broadcast}}, 0x1e) 06:30:59 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000003600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x4, @broadcast, 'gretap0\x00'}}, 0x1e) [ 892.633515] audit: type=1804 audit(1646721059.308:510): pid=1049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2830422423/syzkaller.M9s4Gn/217/file0/bus" dev="sda1" ino=15791 res=1 06:30:59 executing program 4: r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r0, &(0x7f00000008c0)=""/123, 0x7b) 06:30:59 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x86100, 0x0) 06:30:59 executing program 0: sched_setparam(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x24000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0x4) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, 0x0) sendfile(r2, r3, 0x0, 0x10000) 06:30:59 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340), r0) [ 892.702806] audit: type=1800 audit(1646721059.308:511): pid=1049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15791 res=0 06:30:59 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000009000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:30:59 executing program 4: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x22800, 0x0) [ 892.900996] audit: type=1804 audit(1646721059.568:512): pid=1091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2366839211/syzkaller.3mJodH/1517/bus" dev="sda1" ino=14019 res=1 [ 893.003084] audit: type=1800 audit(1646721059.568:513): pid=1091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14019 res=0 06:31:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "602873ca4dade193f1714f566e08b2694a50fd"}) 06:31:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000340)=ANY=[], 0x208e24b) ioctl$KDSETLED(0xffffffffffffffff, 0x6, 0x0) 06:31:00 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000009600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:00 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="a6", 0x1}, {&(0x7f0000000040)="97", 0x1}], 0x2}, 0x0) 06:31:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3004c00, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c09e8fe55a10a0015000400142603600e120800060000000405a8001600a4000440060e0000035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 06:31:00 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0x4020940d, &(0x7f00000004c0)={0x80000000, 0x0, 0x0}) [ 893.434644] f2fs_msg: 117 callbacks suppressed [ 893.434657] F2FS-fs (loop2): Wrong secs_per_zone / total_sections (38400, 11) [ 893.472447] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 893.508506] audit: type=1804 audit(1646721060.178:514): pid=1105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2742680271/syzkaller.4RkN5g/295/file0/bus" dev="loop3" ino=223 res=1 [ 893.515213] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 893.551255] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:31:00 executing program 5: socket$pppoe(0x18, 0x1, 0x0) syz_open_dev$loop(0x0, 0x7fffffff, 0x200) socket$kcm(0x29, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, {0x0, @link_local, 'veth0\x00'}}, 0x1e) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x6) 06:31:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x9}) [ 893.710985] F2FS-fs (loop2): Unable to read 2th superblock [ 893.749781] F2FS-fs (loop2): Wrong secs_per_zone / total_sections (38400, 11) [ 893.749794] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 893.749818] F2FS-fs (loop2): Unable to read 2th superblock 06:31:00 executing program 0: syz_open_procfs$userns(0x0, &(0x7f0000000280)) 06:31:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x0, 0x1}) 06:31:00 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000009700000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:00 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb, 0xc26de6266960579) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200d5d0050080800500000002000020d3"]) 06:31:00 executing program 3: add_key$user(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000580)='(', 0x1, 0xfffffffffffffffd) 06:31:00 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 06:31:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 06:31:00 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, 0x3}, {0x746}, {0x0, 0x4}, {}, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x988c}) 06:31:00 executing program 0: socket(0x2, 0x0, 0xb654) 06:31:00 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x82, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000100)) 06:31:00 executing program 4: syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) [ 894.177471] F2FS-fs (loop2): Wrong secs_per_zone / total_sections (38656, 11) [ 894.196061] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:31:00 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0x40049409, 0x0) 06:31:00 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000040)={0x3, 0x2}) 06:31:00 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000), 0x8a41, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000040)) [ 894.248052] F2FS-fs (loop2): Unable to read 2th superblock [ 894.277143] F2FS-fs (loop2): Wrong secs_per_zone / total_sections (38656, 11) 06:31:01 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003000000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)) 06:31:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000500)={0x0, 0x0, 0x10, 0x0, 0x0, &(0x7f0000000100)="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"}) 06:31:01 executing program 0: socket(0xb8ca9897291a3cd2, 0x0, 0x0) 06:31:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) 06:31:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 06:31:01 executing program 4: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 06:31:01 executing program 1: r0 = syz_open_dev$media(&(0x7f00000008c0), 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:01 executing program 3: mkdir(&(0x7f0000002000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020}, 0x2020) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x10000) lseek(0xffffffffffffffff, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000340)=ANY=[], 0x208e24b) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000000)="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", 0x2000, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x100, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x40000, 0x0, 0xfffffffd, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x801}}}, 0x0, 0x0, 0x0, 0x0}) 06:31:01 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 06:31:01 executing program 5: mkdir(&(0x7f0000002000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002280)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020}, 0x2020) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002180)=ANY=[@ANYBLOB="280000000400000000000000000000000000000000000000fd0f0000000000000000000000000000778a747da3f52950a875bd3f032977f429394e8fe0fad6c366a4765b9e7bf806345110896dd442ae3a619881de9f62d638ee65e9e1add2d205bb76f1711a13a56df825b0c83287ae541adbc08754134f15e21693f53ab4e2b5f8f345e2cc4a42519bd01fd41010a45f4cd5cf54b3963a32da4abf6fa6da46d5562a952a59b7f320bb29466a6728d14967407594fc322db8af08d8c5db61656e4cd328336c10b72400bbf0babc20013d0f4d4f36fea8a2f441f0d789e708a60000000000"], 0x28) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r1, r2, 0x0, 0x10000) openat(0xffffffffffffffff, &(0x7f0000002140)='./file0/file0\x00', 0x20000, 0x142) lseek(0xffffffffffffffff, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000340)=ANY=[], 0x208e24b) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x100, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x40000, 0x0, 0xfffffffd, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x801}}}, 0x0, 0x0, 0x0, 0x0}) ioctl$KDSETLED(0xffffffffffffffff, 0x6, 0x0) 06:31:01 executing program 4: syz_open_dev$swradio(&(0x7f00000006c0), 0x1, 0x2) 06:31:01 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000004000000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:01 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb, 0xc26de6266960579) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200200c050000800500000002000020d3"]) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550d, &(0x7f0000000080)) 06:31:01 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb, 0xc26de6266960579) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f00000000c0)=ANY=[@ANYBLOB="59fe00001b00000081"]) [ 894.558845] audit: type=1804 audit(1646721061.228:515): pid=1195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2742680271/syzkaller.4RkN5g/300/file0/bus" dev="loop3" ino=225 res=1 06:31:01 executing program 4: socket$pppoe(0x18, 0x1, 0x0) syz_open_dev$loop(&(0x7f0000000000), 0x7fffffff, 0x200) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x6) 06:31:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000440)={0xfff, 0x0, 0x0, 0x0, 0x0, "003d3517f6e76aaf"}) [ 894.617591] usb usb1: usbfs: process 1206 (syz-executor.1) did not claim interface 0 before use 06:31:01 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000036000000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 894.670540] audit: type=1800 audit(1646721061.258:516): pid=1195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="loop3" ino=225 res=0 06:31:01 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000000100)={0x9}) 06:31:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) [ 894.821380] audit: type=1804 audit(1646721061.278:517): pid=1203 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1185088129/syzkaller.Dqtqii/452/file0/bus" dev="loop5" ino=226 res=1 [ 894.920422] audit: type=1800 audit(1646721061.278:518): pid=1203 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="loop5" ino=226 res=0 06:31:01 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000680), 0x0, 0x20041) write$FUSE_STATFS(r0, &(0x7f0000000000)={0x60}, 0x60) 06:31:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, 0x0) 06:31:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3004c00, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080006007c09e8fe55a10a0015000400142603600e120800060000000405a8001600a4000440040e0000035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 06:31:01 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000090000000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:01 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb, 0xc26de6266960579) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000080)={0x0, 0x1, [{0x1, 0x1}]}) 06:31:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x300, 0xf0, 0xffffffff, 0xf0, 0x230, 0x468, 0x468, 0xffffffff, 0x468, 0x468, 0x5, 0x0, {[{{@ipv6={@private2, @dev, [], [], 'ipvlan1\x00', 'veth0_vlan\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@dev, @ipv6=@rand_addr=' \x01\x00', @icmp_id, @gre_key}}}, {{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'erspan0\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@hl={{0x28}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @broadcast}, @ipv4=@multicast2, @port, @icmp_id}}}, {{@ipv6={@rand_addr=' \x01\x00', @empty, [], [], 'netdevsim0\x00', 'team0\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@remote, @ipv4=@multicast2, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 06:31:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0xa0}) 06:31:01 executing program 0: add_key$user(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:31:01 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(0xffffffffffffffff, 0x4606, 0x0) 06:31:01 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000096000000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 895.180655] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 895.199046] usb usb1: usbfs: process 1250 (syz-executor.3) did not claim interface 0 before use [ 895.218223] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:31:01 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000000100)) 06:31:01 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xb, 0xc26de6266960579) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200d5d0050080800500000002000020d3"]) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, &(0x7f0000000080)) 06:31:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x48) 06:31:01 executing program 3: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}}}}) 06:31:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) 06:31:01 executing program 0: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x283) 06:31:02 executing program 1: add_key$user(&(0x7f0000000500), 0x0, &(0x7f0000000580)='(', 0x1, 0xfffffffffffffffd) 06:31:02 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @link_local, 'veth0\x00'}}, 0x1e) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000340)) 06:31:02 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000097000000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:02 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) fstat(r0, &(0x7f0000000180)) 06:31:02 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000010c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000001100)=0x1d) 06:31:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'ip6_vti0\x00', &(0x7f00000004c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private1}}) 06:31:02 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)) 06:31:02 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fstat(r0, &(0x7f0000000100)) 06:31:02 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)=0x1f) 06:31:02 executing program 5: openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 06:31:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}}}) 06:31:02 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x200001, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), 0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) 06:31:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt(r0, 0x2, 0x0, 0x0, 0x0) 06:31:02 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, 0x0) 06:31:02 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000002010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280), 0x8) 06:31:02 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$dsp(r0, 0x0, 0x0) 06:31:02 executing program 4: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 06:31:02 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x40a41, 0x0) 06:31:02 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) 06:31:02 executing program 3: socket$pppoe(0x18, 0x1, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x6) 06:31:02 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000140)) 06:31:02 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f00000000c0)) 06:31:02 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0x80086601, 0x0) 06:31:02 executing program 5: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) 06:31:02 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x145d82, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(0xffffffffffffffff, 0x8010500c, 0x0) 06:31:02 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x145d82, 0x0) 06:31:02 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000004010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:02 executing program 0: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x6) 06:31:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)=0x4) 06:31:02 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002600)={[{@size={'size', 0x3d, [0x32, 0x39]}}]}) 06:31:02 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000140), 0x0, 0x0, 0x0) 06:31:02 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) 06:31:02 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x90000, 0x0) 06:31:02 executing program 1: socket(0x25, 0x5, 0x40) 06:31:02 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) write$dsp(r0, 0x0, 0x0) 06:31:02 executing program 3: setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0xffffff76) 06:31:02 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000005010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:02 executing program 5: socket(0xa, 0x0, 0x8000) 06:31:02 executing program 1: openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x43, 0x0) 06:31:02 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x24801, 0x0) 06:31:02 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000100)=0x8001, 0x4) 06:31:02 executing program 0: openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) write$dsp(0xffffffffffffffff, 0x0, 0x0) 06:31:02 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002540), 0x0, &(0x7f0000002600)={[{@size={'size', 0x3d, [0x32, 0x39]}}, {@gid={'gid', 0x3d, 0xee01}}, {@mode}], [{@fowner_gt={'fowner>', 0xee00}}]}) 06:31:02 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000006010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:02 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000300), 0x8000000000000001, 0x131100) 06:31:02 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x3}, {0x746, 0x59}, {}, {}, 0x0, 0x80}) 06:31:02 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000980)) 06:31:02 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x80108907, 0x0) 06:31:02 executing program 0: prctl$PR_SET_MM_MAP(0x7, 0xe, 0xfffffffffffffffe, 0x0) 06:31:02 executing program 3: io_setup(0x9daa, &(0x7f00000011c0)=0x0) io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_submit(r0, 0x3, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0, 0x0]) [ 896.055262] tmpfs: No value for mount option 'fowner>00000000000000060928' 06:31:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8940, 0x0) 06:31:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}}}) 06:31:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 06:31:02 executing program 0: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0xa0000004}) 06:31:02 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000007010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:02 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000040)=0xffff) 06:31:02 executing program 1: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x4b47, 0x0) 06:31:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8933, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:02 executing program 5: socket(0x10, 0x2, 0xffffff80) 06:31:02 executing program 4: socketpair(0x10, 0x0, 0x3f, &(0x7f0000000100)) 06:31:02 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x5450, 0x0) 06:31:02 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0105500, 0x0) 06:31:02 executing program 5: futex(&(0x7f0000000040), 0x0, 0x2, 0x0, 0x0, 0x0) 06:31:02 executing program 0: syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x101300) 06:31:03 executing program 4: socket(0x1, 0x0, 0x3f) 06:31:03 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 06:31:03 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000008010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:03 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:03 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x5450, 0x0) 06:31:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2}, {@multicast1}, {@local}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:03 executing program 1: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5450, 0x0) 06:31:03 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000009010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1, {[@generic={0x94, 0x11, "1b2c97b6c7e3a005fed86f49d81d53"}, @generic={0x44, 0xf, "3511024219d74ac00c2badf40e"}, @timestamp_prespec={0x44, 0xc, 0xcb, 0x3, 0x9, [{@multicast2, 0xfffffff7}]}, @end, @timestamp_prespec={0x44, 0x4c, 0xf7, 0x3, 0x2, [{@broadcast, 0x70b9863f}, {@loopback, 0x9}, {@local, 0x15a}, {@multicast2, 0xa827}, {@rand_addr=0x64010101, 0x3}, {@local, 0x5}, {@private=0xa010102, 0x7}, {@broadcast, 0x3}, {@multicast1, 0xffff}]}, @rr={0x7, 0x7, 0x26, [@broadcast]}]}}}}}) 06:31:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:03 executing program 5: syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x80842) 06:31:03 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000c010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:31:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="98300000640011"], 0x3098}}, 0x0) 06:31:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, 0x0) 06:31:03 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000)={0x20000}, 0x0, &(0x7f0000000080)={0xb}, 0x0) 06:31:03 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x1, 0x0) read$usbfs(r0, &(0x7f00000001c0)=""/158, 0xe2) 06:31:03 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/pstore', 0x0, 0x0) 06:31:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000540)={'sit0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x3, 0x0, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x40, 0x8000, 0x3, 0x0, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x64, 0x0, 0x0, 0x4, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x0, [@broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:03 executing program 5: prctl$PR_SET_SECCOMP(0x36, 0x0, 0x0) 06:31:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2d, 0x0, 0x0) 06:31:03 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000013010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:03 executing program 4: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x40305828, 0x0) [ 896.738930] netlink: 12404 bytes leftover after parsing attributes in process `syz-executor.4'. 06:31:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x15, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 06:31:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x4b47, 0x0) 06:31:03 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0xdd8}) 06:31:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000c40)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}}}) 06:31:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040), r0) 06:31:03 executing program 0: getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x80803, 0xff) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 06:31:03 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000023010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'gre0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 06:31:03 executing program 4: syz_open_dev$mouse(&(0x7f0000000400), 0xffffffffffffffff, 0x0) 06:31:03 executing program 1: pipe2(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read$FUSE(r0, &(0x7f0000000880)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'wg0\x00'}}]}}) 06:31:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:03 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045503, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:03 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000048010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x8c}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x0, 0x1}, 0x14}}, 0x40) 06:31:03 executing program 4: r0 = socket(0xa, 0x3, 0x1f) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 06:31:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYRES32=r1]}) 06:31:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae04, 0x0) 06:31:03 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008550e, 0x0) 06:31:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x3, 0xe9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 06:31:03 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/mdstat\x00', 0x0, 0x0) 06:31:03 executing program 3: socketpair(0xb, 0x0, 0x0, &(0x7f0000000040)) 06:31:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x8c}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x0, 0x1}, 0x14}}, 0x40) 06:31:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:31:04 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200004c010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:04 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x1, 0x0) read$usbfs(r0, 0x0, 0x0) 06:31:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind(r0, &(0x7f0000000600)=@tipc=@id, 0x80) 06:31:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000000)={'syztnl0\x00', 0x0}) 06:31:04 executing program 1: clock_adjtime(0x0, &(0x7f0000000080)={0x7}) 06:31:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000000), 0xa) 06:31:04 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000068010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:04 executing program 1: select(0x8, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0xea60}) 06:31:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000005"], 0x78) 06:31:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) 06:31:05 executing program 3: bpf$MAP_CREATE(0xf, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={&(0x7f0000000540), 0xc, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="d8cd08000c00ffff0f0010000b000100666c6f7765720000180002001400620063d29613d72c1f37df2af7c132dc0fb6060005", @ANYBLOB], 0x3098}}, 0x0) 06:31:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, 0x0, 0x0) 06:31:05 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8010550e, 0x0) 06:31:05 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200006c010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, 0x0, 0x0) 06:31:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18}, 0x48) 06:31:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 898.895550] f2fs_msg: 122 callbacks suppressed [ 898.895564] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 1811939330) [ 898.922336] netlink: 12360 bytes leftover after parsing attributes in process `syz-executor.0'. 06:31:05 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x12) 06:31:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) 06:31:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, 0x0, 0x0) [ 898.948438] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:31:05 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000040)) socketpair(0x26, 0x80000, 0x0, &(0x7f0000000ac0)) 06:31:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x10, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x6e6bbc, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@local, @in6=@dev}}, @sadb_x_sec_ctx={0x1}, @sadb_key={0x1, 0x9}]}, 0x60}}, 0x0) [ 898.998994] F2FS-fs (loop2): Unable to read 2th superblock [ 899.031433] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 1811939330) 06:31:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x2) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="6f158129b498ac61273ca24f55da7d315ff7288c48e1f4a3e09af64e9466e2bf9244c589d44fb1ab59c8e36c0c00b50ba31268164e8550215554b489582e99843534b91745ac6f22f75da1ed967fc93748543fa41060d35062304b45dad746716bdedb2d50f770a28ec23500a588cc6d2476e3c29e1f2e7f2cd424ca57012d3ee215fd3c4f96c1248e46e7afb0f4ce379dbcd31dfec6684cf385dda79af4a6ee3ae91e39b4d00ced748909970ecc13484b540766dc4658334053df1bee0384a2c68929b876eb57bcdc11", 0xca) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 06:31:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)={0x0, "b8434ad1ce00309866731e15395998a094d69363e3ebbc73870a183553128dcbcd20884fbf88cdab29efd7aa4401084a2b0fd3c4e1f40c2f2ae68cc7c0b6083ad475fbaf5193436e5183c989c2ad2753a57b297aab83252d7e7e565d0eb5ff5b7939761274812a79299ba65e23c6b1ca9d18dd5d28ab2a9794c01e47c069e301c5ecaeaa3699a0b1cd6ced4c8a26595b14cf34c3564c82f0b26afb55ee3d01c7f7bdb6dd4859e80e4a26ba5f82c632ea7d5b5c9dd16fbf952c5e0307e91ced4653ae015fbbed76e12e109d10db58c124067e6eea1676846badb8d356016208aaaf56a6e37681275d432e598be1f177e21e1a2902ed57a7e4d307dcf84c7a16a20d685bed96c7272d4183ffa6bbb141b5ecd9de28795fd4797d686cf96cd12b9a0bfe46bd05ea16980fd52ee6432b0a220e591a96fb8c8d68aacdff63628bafdc04f3cfe73d3bcb9813188b77386881afbaef7b8173bb14effe1d9344cc9fc75c1e63bfdccbb8344157fadae3bff7aff64258a2142e0175be213d630eafdb30ce5e375fa32c770c4c712f94d41e23c9db9677dffb0a0b29ed7d23d753cd96b95b3748d001625fba95a35451082ecde2b93ced1c624f861a491c8b6e8ebb1f2c0468e1a65eabe71192e39282beae6a565d20317ee17465b2acb93a40d20a5adfa40653e43c55de828096ee7612150f0f1e938af21ac4934af688e5556a3732fed2"}) 06:31:05 executing program 3: ustat(0x43, &(0x7f0000000000)) [ 899.081283] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:31:05 executing program 1: prctl$PR_SET_MM_MAP(0x27, 0xe, 0xfffffffffffffffe, 0x0) [ 899.135753] F2FS-fs (loop2): Unable to read 2th superblock 06:31:05 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000074010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) 06:31:05 executing program 5: prctl$PR_SET_VMA(0x4, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 06:31:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x4}, 0x48) 06:31:05 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x400000) 06:31:05 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)=@getsa={0x28, 0x12, 0x901, 0x70bd2a, 0x0, {@in6=@mcast1}}, 0x28}}, 0x0) 06:31:06 executing program 4: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0xc020660b, 0x0) 06:31:06 executing program 5: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 06:31:06 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)}, 0x48) 06:31:06 executing program 3: io_setup(0x7ff, &(0x7f0000000040)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) [ 899.350527] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 1946157058) [ 899.389049] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 899.390596] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:31:06 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_async', 0x44041, 0x0) 06:31:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 899.496763] F2FS-fs (loop2): Unable to read 2th superblock [ 899.513602] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 1946157058) 06:31:06 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200007a010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:06 executing program 5: select(0xffffffffffffff36, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 06:31:06 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x541b, 0x1) 06:31:06 executing program 3: r0 = socket(0x2, 0x3, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100), r0) 06:31:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 06:31:06 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8901, 0x0) 06:31:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x10e, 0x3, 0x0, 0x0) 06:31:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a0, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:06 executing program 0: prctl$PR_SET_MM_MAP(0x15, 0xe, 0xfffffffffffffffe, 0x0) 06:31:06 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x82, 0x0) 06:31:06 executing program 5: bpf$MAP_CREATE(0xe, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:06 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000030000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:06 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x4b47, 0x0) 06:31:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8907, 0x0) 06:31:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) 06:31:06 executing program 5: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f00000012c0)={0x0, 0x0, 0x7}) 06:31:06 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x10, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) 06:31:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8903, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:06 executing program 1: socket(0x10, 0x80802, 0x10000) 06:31:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f3, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2}, {@multicast1}, {@local}, {}]}]}}}}}) [ 899.936078] attempt to access beyond end of device 06:31:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x2, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:06 executing program 0: r0 = socket(0x10, 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r0) [ 899.992313] loop2: rw=12288, want=8200, limit=12 [ 900.020317] attempt to access beyond end of device [ 900.045587] loop2: rw=12288, want=12296, limit=12 [ 900.077100] attempt to access beyond end of device [ 900.120640] loop2: rw=12288, want=8200, limit=12 [ 900.138601] attempt to access beyond end of device [ 900.164550] loop2: rw=12288, want=12296, limit=12 06:31:06 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000050000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:06 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="000421f3"]) 06:31:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 06:31:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:06 executing program 5: prctl$PR_GET_TSC(0xf, &(0x7f0000000000)) 06:31:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r0) 06:31:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000400)) 06:31:07 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8402, 0x0) 06:31:07 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x10000000}) 06:31:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0x308, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x438) [ 900.345732] attempt to access beyond end of device [ 900.365121] loop2: rw=12288, want=8200, limit=12 [ 900.383049] attempt to access beyond end of device [ 900.404102] loop2: rw=12288, want=12296, limit=12 06:31:07 executing program 5: bpf$MAP_CREATE(0xa, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 900.434125] attempt to access beyond end of device [ 900.455856] loop2: rw=12288, want=8200, limit=12 [ 900.481731] attempt to access beyond end of device [ 900.504019] loop2: rw=12288, want=12296, limit=12 06:31:07 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/smsc95xx', 0x70100, 0x0) 06:31:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x40040, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) socket$nl_generic(0x10, 0x3, 0x10) 06:31:07 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, 0x0) 06:31:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x8c}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x0, 0x1}, 0x14}}, 0x40) 06:31:07 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 06:31:07 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000060000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002780)={&(0x7f0000002d00)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWTABLE={0x13c, 0x0, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_TABLE_USERDATA={0x59, 0x6, "3b16cb124dfa28cfa0c70b045647673a62de2fd6f5a79a6bea9388b49e8556b598c4f768b3bec1689e3ff0ed24129fd705bbdc21530473da27db5df4866477f2f073470c3af2d5397f1b9c67405f84766d5a9e33bc"}, @NFTA_TABLE_USERDATA={0xb4, 0x6, "c6658210e146e92c44d080752995c7d2e8053781326180aa330020e6eb46d1e8b746356d692378ba3bbd504377fc77119d1ad165abeb3791553691cc9988e34360e60de3f0dff86a50f4ac6f71caa72dcb54e5ca7cd809938fe0f6376d0a7cfde5c6842eb2f35914c8a6da9070db50b0e8455c388d1384136f8d49441b5fdfd11d8261dda27156bd73a84c4a8047d61aeeaa940b85090381493a31827c891d189ef39e5603bf2e1d42582ab10725d184"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELSET={0x24, 0xb, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x15}]}, @NFT_MSG_NEWSETELEM={0xcdc, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xcc8, 0x3, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x184, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x35, 0x1, "99d4d1adb2631d5125bf7361bbae31008e9bff3f8f24293307d784feb4ef17479f009bb7f1ed5f5ec3e77003aa8e213f5c"}, @NFTA_DATA_VALUE={0x15, 0x1, "d9245d7d1a32344bef13b8c1885613a04c"}, @NFTA_DATA_VALUE={0x35, 0x1, "2af1dc17cc45a49ab84f2933618079a66c4f5d17753279b4559d380a57f86ecf7a29c9e993604abca2ad4f5b1f8fc096cf"}, @NFTA_DATA_VALUE={0x9, 0x1, "49ebaf2bf7"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x99, 0x1, "b9d5f3c2f031b6836686331fdddcf2a881671ff4d301d8f5730e16b2da5cc9258cfdd9afc1b8b56da831deb72ebfcb1947971cfec81e8080a6499117a0520fb2f247dafabf91d52baa9c894395529ff0dcc9ec3f58a1aafce6079e4dd0f15740666678e2d4f8c50db62e368fe9ed73f858481b0c02510d3f92b7c630499794e86264c2a006701d341c557e2918ac0f71e9a0ee7320"}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1ff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x20, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000001}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}]}, {0x6bc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x20}, @NFTA_SET_ELEM_EXPRESSIONS={0x2e8, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @void}}, {0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x64, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x81}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x8000}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xe}]}}}, {0x10, 0x1, 0x0, 0x1, @exthdr={{0xb}, @void}}, {0x58, 0x1, 0x0, 0x1, @fib={{0x8}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x18}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x64}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x35}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_FIB_RESULT={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xa}]}}}, {0x1e8, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1d8, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DATA={0x1c0, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4cbde1d5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "c5ca44ae741074151b1484dbb411b895bdeb4538d5f921ec41b182635042043b5edcc96f38024c665003054a1675f2755a0793c53c991143a0178bc8b5bfefb616644dd6cf5666c5501b347f3d1ebf18771560ea60dd9a090b31abfe23eceebcbe6ac6f66c8deb24e78a19f39280f1e7d947b9bb340a38bbde363b418c2b68695713320a0f2d6ccdf1bf697523722375edb6e109f9218fa2d41b2a68f45236eb1512e67d2aaea0712fdc259396b9e0d2a930d095ef42e4b16c78cdd65917e2c42c35e270f6eaeb16dc391351ee1bee84c41e5983b69b2b1a5fd2af595a8339e24cec6ad490"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_OP={0x8}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x54b1}, @NFTA_SET_ELEM_USERDATA={0xc4, 0x6, 0x1, 0x0, "126e6daca8f10e8480bca0e88a73aadeff55e1927544e4cc1661463f691c55df99008f66f2826a21a07735944b37640257f6521f7894b9fe7de1af438efbc87cd34e21d1582cc8bbc2c791676218dee0831f24f603c4c0075115166fcca67f7496e694af61ce1e1d7d749171360ddfc47148e1ebfe168ca45c2f909c366ef1155fcd161cfd35c20fb0c2a2b89775ece2e523fff85363b8d57df359f9ebfebee7fa07b1d419374e571d9af1afe18fa47855fba87a94561ebb7e5379c774012518"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_KEY={0x1c8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xcd, 0x1, "a95522aa433c3b87d3032c6e663a83d392a06247832439e1243dbf4e66ae1d6f616dc594421e9bb8ce85a48420fb214df5510c23a2a3b1936ebc5332f5cc14fda6882fb9b3679a2733302a04ec5b682caaced742ea4293a2505f3391d97982fa9c3a694c6e6c4595d39c4cc3b97bc0872f125445880e11876e901591911df82cb334125fc03ee30f7ada20f2b2f3b078d8d82a72bad3826b2038e413ea017c951d97f8b703c9d2d3d75d46609039c95814a42d56ecf87e855548f41ac0ef0e86893456580896226e40"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "e07af2efb706418a55d3ad8ab7492daf637fdbf57793a3e9a426dc6703a3633b2c7c057c04c7751ed4bf6d01ff1c1d524557f235b78e5f18bdbba72655eeea136fad832943c4ebee5fe0f32e3e97a88e552b15cc0f0601e168fdbb902d9a6ff28eb0476160bf13fa9bf2788e8809ccb16493d14babf6516891"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_DATA={0x118, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "65846f2c6fe1a29c4664fff570e606a17aa4cfc1fc8f61f913770d2dd9e1ac6c2bdc08f3affdadf7bdadeddd3222b5367839fba01d63ec38870a738808ec89b979a0526fd71dee56f9"}, @NFTA_DATA_VALUE={0x4e, 0x1, "c4c94e671948b05a8a9d9c46e6fdc860dfc80bdc5f52c7da5570e4d776a55176820eb55c38280d9750f0d4b4e3e3d949f1c66db66375f713c76563c725bee926059e45774ef3074ae7cf"}]}]}, {0x3a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x94, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @queue={{0xa}, @void}}, {0x44, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x13}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x1c, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x85, 0x1, "6d31ee2c20255c8b3040b34e682c8994954e2c5f5113ba1ba66bc960fbe55e22b744fc92e3cffd94314d77cb71f9c9cbe5ac37db14dbc214c4d60788886ffc0b8e8bc322cd664430237a7a53a00d3805fe3a68aba6e2d516dad2acd3e6aa53829b6cf2a452befd543d81696aa0ac85c0edfc35a55970aceddbd5a5e5fc10f347e7"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY={0x17c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x800}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xd5, 0x1, "e2f8d4b571540559442143aab05eca013941ec7c967e40dfa8e0d630c67d3f23c7d230e39c072bfe06d410754af78e82a70c5c593932bf27478374bd0ff99356df6432dac40685340c6a4818e8d4e50153f01fbfe301647c8d6429775fa65e520443194596b46fa97c6e3e43a2082680b659c50647edc9d3de3bb174dfc309a54975c262892a34a3a5b403781ffce5adce844d26790d538fc625c66b53b373683efac49cecfc674ac5d850d3198dd00333e176aee54651e220a68faf142c0710d36a37dc3e4e7ed1e9f07cf372a8e186ac"}, @NFTA_DATA_VALUE={0x38, 0x1, "2b11f96ceb22a51848f748e99e4fcbc9690b0c67d7d1c1b7bed09d071e7d7b42c05ba8a88ff5607fa5f72c9753af0f00bb3cbb6f"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x9a, 0x6, 0x1, 0x0, "9b55123e3b998609a500f0d8ff202825366bbce81716673fc6fb7a2e4b3a5feff520e2470a640b73c46fd342b6c848a8c542e007ac17a8fed4404467c259d511d9167f184d2dc9b399897644c1e391bcc514e627cb83f370396af3409fe930bca76f2b9cbccee2b816190208703fa89bad5a3de5c1ea4608a53186be65f11d7f7571e8c8cb59056062013c211766ceae4edb4fbe02f4"}, @NFTA_SET_ELEM_USERDATA={0x30, 0x6, 0x1, 0x0, "8ac53f2cf1e15193cf3e9b8d1c91bb5c2cb4cc7a755967afa27cc60f8a9a3ca3bc53535a1ca0f769ce82e2cf"}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x8c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x38, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1ff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY={0x50, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x49, 0x1, "cf9c553fdbc1dadfbbc594b124ac4b8eaf2e9742c91e5592e7ce15bda67f83abf5fa869cd726aef0ba5c95cb37155378e93b4c9e7413af879667b2eaa4ec5e6f29469dabe3"}]}]}]}]}], {0x14}}, 0xe84}}, 0x0) 06:31:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x2, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:07 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, 0x0) 06:31:07 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045515, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:07 executing program 0: socket(0x11, 0xa, 0x5) 06:31:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 900.759702] attempt to access beyond end of device [ 900.776981] loop2: rw=12288, want=8200, limit=12 06:31:07 executing program 3: r0 = epoll_create1(0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 06:31:07 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) [ 900.823331] attempt to access beyond end of device [ 900.858452] loop2: rw=12288, want=12296, limit=12 [ 900.877403] attempt to access beyond end of device 06:31:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@private0, 0x0, 0x2b}, 0x0, @in=@broadcast, 0x0, 0x4}}, 0xe8) 06:31:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8912, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:07 executing program 0: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ff9000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/2) [ 900.900372] loop2: rw=12288, want=8200, limit=12 [ 900.925418] attempt to access beyond end of device [ 900.936041] loop2: rw=12288, want=12296, limit=12 06:31:07 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000070000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:07 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8941, 0x0) 06:31:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="44000000030301030000000000000000030000050c"], 0x44}}, 0x0) 06:31:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) keyctl$clear(0x7, r0) 06:31:07 executing program 5: prctl$PR_SET_MM_MAP(0x19, 0x20000000, 0xfffffffffffffffe, 0x0) 06:31:07 executing program 0: clock_gettime(0x7, &(0x7f0000009100)) 06:31:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000040)=ANY=[]}) 06:31:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:07 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8010550e, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 901.112416] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 06:31:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) [ 901.158371] attempt to access beyond end of device 06:31:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fchown(r0, 0x0, 0x0) [ 901.181920] loop2: rw=12288, want=8200, limit=12 06:31:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f00000009c0)={'gre0\x00', 0x0}) [ 901.222298] attempt to access beyond end of device [ 901.243141] loop2: rw=12288, want=12296, limit=12 [ 901.262419] attempt to access beyond end of device [ 901.290939] loop2: rw=12288, want=8200, limit=12 [ 901.302027] attempt to access beyond end of device [ 901.308173] loop2: rw=12288, want=12296, limit=12 06:31:08 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000090000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:08 executing program 3: r0 = add_key$user(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="ab", 0x1, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0) 06:31:08 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) bind(r0, 0x0, 0x0) 06:31:08 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x5452, &(0x7f0000000000)={'wpan4\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) 06:31:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8935, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, 0x0, 0x0) 06:31:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @multicast1}}}}) 06:31:08 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:08 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000740), 0x4400, 0x0) 06:31:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x61}]}) [ 901.514555] attempt to access beyond end of device [ 901.540775] loop2: rw=12288, want=8200, limit=12 [ 901.572912] attempt to access beyond end of device [ 901.602241] loop2: rw=12288, want=12296, limit=12 06:31:08 executing program 1: prctl$PR_SET_TIMERSLACK(0x26, 0x0) [ 901.627059] attempt to access beyond end of device [ 901.655964] loop2: rw=12288, want=8200, limit=12 06:31:08 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000b0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:08 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000003480)={0x30000002}) 06:31:08 executing program 4: r0 = socket(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), r0) 06:31:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890b, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:08 executing program 0: r0 = socket(0x10, 0x2, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r0) 06:31:08 executing program 1: keyctl$negate(0xd, 0x0, 0x0, 0xfffffffffffffff8) [ 901.688783] attempt to access beyond end of device [ 901.695283] loop2: rw=12288, want=12296, limit=12 06:31:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x10, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_key={0x1, 0x9}, @sadb_x_filter={0x5, 0x1a, @in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x48}}, 0x0) 06:31:08 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x5}]}) 06:31:08 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='{') mlock(&(0x7f0000f5b000/0x4000)=nil, 0x4000) munmap(&(0x7f0000800000/0x800000)=nil, 0x800000) [ 901.873795] attempt to access beyond end of device [ 901.888445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 06:31:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x2f, 0x7, 0x8, 0x9, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x7800, 0x8000, 0x4, 0x4}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x4, 0x3, 0x9, 0x800, 0x48, @local, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8, 0x87a0, 0x1, 0x1}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000580)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000680)=[{}], 0x8, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x40, 0x8000, 0x3, 0x9, {{0x15, 0x4, 0x2, 0x3, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000cc0)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001540)={0x3c8, 0x0, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x66, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x3c8}, 0x1, 0x0, 0x0, 0x90}, 0xd4534338e64f1aa3) [ 901.921848] loop2: rw=12288, want=8200, limit=12 06:31:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x388, 0xffffffff, 0xe8, 0x230, 0x0, 0xffffffff, 0xffffffff, 0x548, 0x548, 0x548, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "e90200db000a8b43387e33c21515eeaf4f0912a2114765586736dd249aa4"}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "7ea4d6e2683d605e98d0dad13a69f21da7f3340b4d8f0311339d64356d13"}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "a987cafa0690a984d5ad7f70205975c0b495de86998c66ccf2169373eaad"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e8) [ 901.946722] attempt to access beyond end of device [ 901.965420] loop2: rw=12288, want=12296, limit=12 [ 902.005358] attempt to access beyond end of device [ 902.029716] loop2: rw=12288, want=8200, limit=12 [ 902.046549] attempt to access beyond end of device [ 902.071067] loop2: rw=12288, want=12296, limit=12 06:31:08 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000f0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:08 executing program 5: socket(0x10, 0x0, 0x6) 06:31:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x3, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:08 executing program 3: socket(0x1, 0x4, 0x0) 06:31:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4d, 0x0, 0x0) 06:31:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)=@getsa={0x28, 0x12, 0x901, 0x0, 0x0, {@in6=@mcast1}}, 0x28}}, 0x0) 06:31:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001940)={&(0x7f0000000f80), 0xc, &(0x7f0000001500)={&(0x7f0000001340)=@newchain={0x50, 0x64, 0x1, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @TCA_RATE={0x6}, @filter_kind_options=@f_matchall={{0xd}, {0x4}}]}, 0x50}}, 0x0) 06:31:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="d8cd08000c00ffff0f0010000b000100666c6f776572000018"], 0x3098}}, 0x0) 06:31:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8901, 0x0) 06:31:08 executing program 4: mount$9p_fd(0x0, 0x0, 0x0, 0xc1a1f256969be92e, 0x0) [ 902.270041] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 06:31:09 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000130000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x40086602, 0x1) 06:31:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4020940d, 0x1) [ 902.381893] netlink: 12368 bytes leftover after parsing attributes in process `syz-executor.3'. 06:31:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x10, r1, 0x73a255561c7f97b9}, 0x1c}}, 0x0) 06:31:09 executing program 4: syz_open_dev$vcsu(&(0x7f0000000b00), 0x97c4, 0x0) 06:31:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, 0x0) 06:31:09 executing program 5: socket(0x2c, 0x3, 0x0) select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0xea60}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:31:09 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000140000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:09 executing program 0: prctl$PR_SET_SECCOMP(0x2f, 0x0, 0x0) 06:31:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd", @ANYRES32=0x0, @ANYBLOB="d8cd08"], 0x3098}}, 0x0) 06:31:09 executing program 3: prctl$PR_SET_TIMERSLACK(0x22, 0x0) 06:31:09 executing program 1: clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x0, 0x7, 0x200}, &(0x7f0000000040)={0x4}, 0x0, &(0x7f0000000540)={r0, r1/1000+10000}) 06:31:09 executing program 0: signalfd4(0xffffffffffffffff, &(0x7f0000000580), 0x8, 0x0) [ 902.671525] netlink: 12404 bytes leftover after parsing attributes in process `syz-executor.4'. 06:31:09 executing program 3: socket(0x2c, 0x80803, 0x3) 06:31:09 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), 0x0) 06:31:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg1\x00'}) 06:31:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:09 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000200000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00', {}, {}, 0x0, 0x0, 0x8}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'tunl0\x00'}) 06:31:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@base={0x5, 0x3f, 0x9, 0x7ff, 0x0, 0x1}, 0x48) 06:31:09 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 06:31:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x45}]}) 06:31:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x5, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:09 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000250000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:09 executing program 4: r0 = socket(0x2, 0x80803, 0x7f) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0, 0xf0ff7f}}, 0x0) 06:31:09 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x40087602, 0x0) 06:31:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x5460, 0x0) 06:31:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)=ANY=[], 0x78) 06:31:09 executing program 1: prctl$PR_SET_VMA(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') 06:31:09 executing program 4: prctl$PR_SET_SECCOMP(0x26, 0x0, 0x0) 06:31:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x3e, 0x0, &(0x7f0000000d00)) 06:31:09 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000003f0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:09 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, 0x0, 0x0) 06:31:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f0000000c40)={'gretap0\x00', 0x0}) 06:31:10 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x4b47, 0x0) 06:31:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000b00)=ANY=[]}) [ 903.348637] x_tables: duplicate underflow at hook 2 06:31:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x10, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x38}}, 0x0) 06:31:10 executing program 1: prctl$PR_SET_SECCOMP(0x27, 0x0, &(0x7f0000000040)={0x0, 0x0}) 06:31:10 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000400000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 06:31:10 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 06:31:10 executing program 5: futex(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0) 06:31:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x3, 0xe9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) 06:31:10 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000630000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:10 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000800)="b5"}, 0x48) 06:31:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x541b, 0x0) 06:31:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891c, 0x0) 06:31:10 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x5452, 0x0) 06:31:10 executing program 0: prctl$PR_SET_TIMERSLACK(0x16, 0x0) 06:31:10 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003820000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:10 executing program 3: prctl$PR_GET_TSC(0x19, &(0x7f0000000240)) prctl$PR_GET_TSC(0x19, &(0x7f0000000280)) 06:31:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0xd0, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:10 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0xc0045878, 0x0) 06:31:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:11 executing program 0: r0 = socket(0x10, 0x2, 0xa) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}]}, 0x28}}, 0x0) 06:31:11 executing program 1: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mincore(&(0x7f0000c00000/0x400000)=nil, 0x400000, &(0x7f0000000040)=""/224) 06:31:11 executing program 4: socketpair(0x28, 0x0, 0x200, &(0x7f0000000000)) 06:31:11 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003850000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 06:31:11 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) 06:31:11 executing program 1: prctl$PR_SET_TIMERSLACK(0x2a, 0x9) 06:31:11 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5411, 0x0) 06:31:11 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug', 0x0, 0x0) 06:31:11 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x1, 0x0) read$usbfs(r0, 0x0, 0x7ffffffff000) [ 904.635341] f2fs_msg: 104 callbacks suppressed [ 904.635355] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) 06:31:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6tnl0\x00', 0x0}) 06:31:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8918, &(0x7f0000000c40)={'tunl0\x00', 0x0}) [ 904.698606] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 06:31:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, 0x0, 0x0) 06:31:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, 0x0, 0x0) [ 904.761853] F2FS-fs (loop2): Unable to read 2th superblock [ 904.797913] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) 06:31:11 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x5207, 0x0) [ 904.835560] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 904.882005] F2FS-fs (loop2): Unable to read 2th superblock 06:31:11 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003860000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8941, 0x0) 06:31:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a0, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, 0xffffffffffffffff) 06:31:11 executing program 3: r0 = socket(0x2, 0x3, 0x7f) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 06:31:11 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x203, 0x0) 06:31:11 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8940, 0x0) 06:31:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:11 executing program 5: pselect6(0x40, &(0x7f0000000a40), 0x0, &(0x7f0000002340)={0x10000}, 0x0, 0x0) 06:31:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) [ 905.097798] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) [ 905.105585] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 905.113533] F2FS-fs (loop2): Unable to read 2th superblock [ 905.125047] F2FS-fs (loop2): Invalid segment/section count (30, 11 x 50331650) 06:31:11 executing program 3: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 06:31:11 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003870000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2e, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 06:31:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 06:31:12 executing program 3: read$usbfs(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x64, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0x0, [{@multicast2}, {@multicast1, 0xffffffc0}, {@local}, {}]}]}}}}}) socket$inet_udp(0x2, 0x2, 0x0) 06:31:12 executing program 4: socketpair(0x2, 0x5, 0x80, &(0x7f00000005c0)) 06:31:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x7, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @local, {[@noop, @timestamp={0x44, 0x14, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}, @cipso={0x86, 0x1a, 0x0, [{0x0, 0x9, "4c4882febff5ae"}, {0x0, 0xb, "f0cc160744d80b5141"}]}, @rr={0x7, 0xb, 0x0, [@empty, @empty]}, @rr={0x7, 0xf, 0x0, [@broadcast, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x34, 0x0, 0x3, 0x0, [{@private}, {@remote}, {@empty}, {}, {@dev}, {@remote}]}]}}}}}) 06:31:12 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r0, &(0x7f0000000000), 0xfffffffffffffe2a) 06:31:12 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003880000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8901, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:12 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f0000000900), 0xffffffffffffffff) 06:31:12 executing program 3: r0 = epoll_create1(0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 06:31:12 executing program 0: rt_sigqueueinfo(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x4}) 06:31:12 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:31:12 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 06:31:12 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) connect(r0, 0x0, 0x0) 06:31:12 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x4e743, 0x0) 06:31:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:12 executing program 0: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x2, 0x0) 06:31:12 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003890000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'gre0\x00', &(0x7f0000000900)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 06:31:13 executing program 1: syz_open_dev$mouse(&(0x7f0000000400), 0x0, 0xd4000) 06:31:13 executing program 3: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5451, 0x0) 06:31:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:13 executing program 0: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000001a80)) 06:31:13 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000038a0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:31:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:13 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000240)=""/239) 06:31:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8935, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, 0x0, 0x0) 06:31:13 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000038b0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:13 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x41045508, 0x0) 06:31:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3}]}) 06:31:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={&(0x7f0000000080), 0x7, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, 0x2, 0x7, 0x0, 0x0, 0x0, {}, [@NFACCT_PKTS={0xffffffffffffffd0}, @NFACCT_QUOTA={0xc}]}, 0x2c}}, 0x0) 06:31:13 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000003c80)='ns/pid\x00') 06:31:13 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x24001, 0x0) 06:31:13 executing program 1: r0 = socket(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), r0) 06:31:13 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000026930000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:13 executing program 4: prctl$PR_SET_MM_MAP(0x2, 0x1ffff000, 0xfffffffffffffffe, 0x0) 06:31:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x3, 0x0, 0x0, 0xffffff01}]}) 06:31:13 executing program 3: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000) 06:31:13 executing program 5: io_setup(0x3, &(0x7f0000000000)=0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, r1, &(0x7f0000000040)}]) 06:31:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000fcffff"], 0x1c}}, 0x0) 06:31:13 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r0, 0x0, 0x0, 0x0) capget(&(0x7f0000000140)={0x20080522, r0}, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(0xffffffffffffffff, 0x4068aea3, 0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000040)=0x3ed) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x1) 06:31:13 executing program 0: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 06:31:13 executing program 3: prctl$PR_SET_SECCOMP(0xf, 0x0, 0x0) 06:31:13 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000026940000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:13 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x11b, 0x9, 0x0, 0x0) 06:31:13 executing program 0: r0 = socket(0x2, 0x3, 0x7f) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000380)={&(0x7f0000000100), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 06:31:13 executing program 5: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 06:31:13 executing program 4: r0 = socket(0xf, 0x3, 0x2) bind$bt_l2cap(r0, 0x0, 0x0) 06:31:13 executing program 3: prctl$PR_SET_TIMERSLACK(0x2f, 0x0) 06:31:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, 0x0, 0x0) 06:31:13 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000269d0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890b, 0x0) 06:31:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891c, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:13 executing program 1: r0 = socket(0xf, 0x3, 0x2) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:31:13 executing program 3: r0 = socket(0xa, 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) 06:31:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:13 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x40, 0x0) 06:31:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f00000003c0)) 06:31:14 executing program 1: io_setup(0x9daa, &(0x7f00000011c0)=0x0) io_destroy(r0) 06:31:14 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000026ab0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, 0x0, 0x0) 06:31:14 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000005c0)={'ip_vti0\x00', &(0x7f0000000540)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast2}}}}) 06:31:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4c, 0x0, 0x0) 06:31:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3a, 0x0, 0x0) 06:31:14 executing program 0: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) 06:31:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000002000)='westwood\x00', 0x9) 06:31:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:14 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003b90000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:14 executing program 5: prctl$PR_SET_TIMERSLACK(0x35, 0x0) 06:31:14 executing program 0: ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000180)) munmap(&(0x7f0000fff000/0x1000)=nil, 0x3000) 06:31:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x40, 0x8000, 0x3, 0x9, {{0x15, 0x4, 0x2, 0x3, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd0, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:14 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003ba0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:14 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x4008550c, 0x0) 06:31:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x2, 0x0, 0x0, 0xfae3}]}) 06:31:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890d, 0x0) 06:31:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2e, 0x0, 0x0) 06:31:14 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000003c20000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:14 executing program 3: prctl$PR_SET_TIMERSLACK(0x22, 0x9) 06:31:14 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) select(0x40, &(0x7f00000016c0), 0x0, &(0x7f0000001740)={0xd70}, &(0x7f00000017c0)={0x0, 0x2710}) 06:31:14 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 06:31:14 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 06:31:14 executing program 1: socket(0x10, 0x2, 0x4) 06:31:14 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5450, 0x1) 06:31:14 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000027ff0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) 06:31:15 executing program 5: bpf$MAP_CREATE(0x2, 0x0, 0x10) 06:31:15 executing program 3: socketpair(0x2, 0xa, 0x27, &(0x7f0000000040)) 06:31:15 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000005c0)={'ip_vti0\x00', 0x0}) 06:31:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000440)={0x1, &(0x7f0000000280)=[{0xf801}]}) 06:31:15 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000020000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0xb, [{@multicast2}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:15 executing program 5: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x2, 0x0) 06:31:15 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000680), 0x220040, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, &(0x7f00000000c0)) 06:31:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x23, 0x0, @remote, @dev}}}}) [ 909.109520] attempt to access beyond end of device [ 909.125672] loop2: rw=12288, want=8200, limit=12 [ 909.138788] attempt to access beyond end of device 06:31:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0xc020660b, 0x1) 06:31:15 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x5522, 0x0) 06:31:15 executing program 0: prctl$PR_SET_TIMERSLACK(0x2a, 0x0) [ 909.157638] loop2: rw=12288, want=12296, limit=12 06:31:15 executing program 1: r0 = socket(0x10, 0x2, 0x0) bind$bt_hci(r0, 0x0, 0x0) [ 909.198663] attempt to access beyond end of device 06:31:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5411, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) [ 909.222113] loop2: rw=12288, want=8200, limit=12 [ 909.231507] attempt to access beyond end of device [ 909.245862] loop2: rw=12288, want=12296, limit=12 06:31:15 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000030000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 06:31:15 executing program 1: prctl$PR_SET_TIMERSLACK(0x3, 0x0) 06:31:16 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) 06:31:16 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x40085511, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0xc0189436, &(0x7f0000000440)) 06:31:16 executing program 1: pipe2(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 06:31:16 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 06:31:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 06:31:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={&(0x7f0000000540), 0xc, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="2000020004000000f745dc7bffffffff050000000004001001000000", @ANYRES32=0x0, @ANYBLOB="20000200850700000600000005000000000000000600000003000000", @ANYRES32=0x0, @ANYBLOB="2000020001040000020000000600000008000000ff7f000003000000", @ANYRES32, @ANYBLOB="2000020000100000ff0300005789d5e0000000800800000001000000", @ANYRES32, @ANYBLOB="20000200ffff00000000000002000000010000000002000004000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3098}}, 0x0) [ 909.441416] attempt to access beyond end of device [ 909.458356] loop2: rw=12288, want=8200, limit=12 06:31:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5450, 0x1) [ 909.496495] attempt to access beyond end of device 06:31:16 executing program 1: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000600)=[{}], 0x1, 0x80000001, 0x0, 0x0) [ 909.525718] loop2: rw=12288, want=12296, limit=12 [ 909.540222] attempt to access beyond end of device [ 909.559946] loop2: rw=12288, want=8200, limit=12 [ 909.579598] attempt to access beyond end of device [ 909.600861] loop2: rw=12288, want=12296, limit=12 06:31:16 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000040000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:16 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) 06:31:16 executing program 4: prctl$PR_SET_SECCOMP(0x38, 0x0, &(0x7f0000000040)={0x0, 0x0}) 06:31:16 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) 06:31:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0xc0189436, 0x1) 06:31:16 executing program 0: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x3000) 06:31:16 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f0000000580), 0x8, 0xc0000) 06:31:16 executing program 3: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x28c2177d7be2f1f, 0x0) 06:31:16 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000040)) 06:31:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 909.800360] f2fs_msg: 94 callbacks suppressed [ 909.800371] F2FS-fs (loop2): Unable to read 2th superblock [ 909.830419] F2FS-fs (loop2): Test dummy encryption mount option ignored 06:31:16 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop5', 0x60040, 0x0) [ 909.869783] attempt to access beyond end of device [ 909.889025] loop2: rw=12288, want=8200, limit=12 [ 909.902146] attempt to access beyond end of device [ 909.928024] loop2: rw=12288, want=12296, limit=12 [ 909.936914] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 909.981501] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 909.990004] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 910.001184] F2FS-fs (loop2): Test dummy encryption mount option ignored [ 910.010588] attempt to access beyond end of device [ 910.018050] loop2: rw=12288, want=8200, limit=12 [ 910.023248] attempt to access beyond end of device [ 910.028232] loop2: rw=12288, want=12296, limit=12 [ 910.033762] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 06:31:17 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x4020940d, 0x0) 06:31:17 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)='\r', &(0x7f0000000800)="b5"}, 0x48) 06:31:17 executing program 4: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x80086601, 0x0) 06:31:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, 0x0, 0x0) 06:31:17 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000080)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) 06:31:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000050000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f00000000c0)={0x77359400}, 0x10) 06:31:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c) 06:31:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 06:31:17 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/config', 0x0, 0x0) [ 910.560411] F2FS-fs (loop2): Unable to read 2th superblock 06:31:17 executing program 0: mincore(&(0x7f0000c00000/0x400000)=nil, 0x400000, &(0x7f0000000040)=""/224) 06:31:17 executing program 5: prctl$PR_SET_MM_MAP(0x18, 0xe, 0xfffffffffffffffe, 0x0) [ 910.604312] F2FS-fs (loop2): Test dummy encryption mount option ignored [ 910.632089] attempt to access beyond end of device [ 910.661793] loop2: rw=12288, want=8200, limit=12 [ 910.681328] attempt to access beyond end of device 06:31:17 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 06:31:17 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x208000, 0x0) [ 910.707759] loop2: rw=12288, want=12296, limit=12 06:31:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000200)={'syztnl1\x00', 0x0}) 06:31:17 executing program 5: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x541b, 0x0) [ 910.744104] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 910.781025] attempt to access beyond end of device [ 910.797244] loop2: rw=12288, want=8200, limit=12 [ 910.808833] attempt to access beyond end of device [ 910.817951] loop2: rw=12288, want=12296, limit=12 06:31:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000060000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)=@req={0x28, &(0x7f0000000880)={'ipvlan1\x00', @ifru_data=0x0}}) 06:31:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 06:31:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, 0x0, 0x0) 06:31:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000c40)={'gre0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:17 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000002f80), 0x12000, 0x0) 06:31:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:17 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xee, 0x0) 06:31:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000070000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8903, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4b49, 0x1) 06:31:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000080000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:17 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0}, 0x48) 06:31:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x37, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xd}, 0x48) 06:31:17 executing program 3: select(0x40, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000300)) 06:31:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8904, 0x0) 06:31:17 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000090000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:18 executing program 5: prctl$PR_SET_SECCOMP(0x1d, 0x0, 0x0) 06:31:18 executing program 0: io_setup(0x3, &(0x7f0000000000)=0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0}]) 06:31:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x20) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x4b47, 0x0) 06:31:18 executing program 3: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0xc0045878, 0x0) 06:31:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000040)="eb", 0x1}], 0x1}, 0x4000060) 06:31:18 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 06:31:18 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000b0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, 0x0, 0x0) 06:31:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x894c, 0x0) 06:31:18 executing program 3: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xd2f6a28b3a26fffe, 0xffffffffffffffff, 0x0) 06:31:18 executing program 4: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0xffffffffffffffff) 06:31:18 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000f0000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:18 executing program 5: add_key$keyring(&(0x7f0000000080), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) 06:31:18 executing program 0: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x10) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 06:31:18 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f00000001c0)=0x6) 06:31:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x60}]}) 06:31:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5421, 0x1) 06:31:18 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000100000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:18 executing program 5: sigaltstack(&(0x7f0000000780)={0x0, 0x3}, 0x0) 06:31:18 executing program 0: prctl$PR_SET_TIMERSLACK(0x2c, 0x0) 06:31:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@getpolicy={0x50, 0x15, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x50}}, 0x0) 06:31:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:18 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000130000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:18 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0xc0189436, 0x0) 06:31:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) 06:31:18 executing program 0: socketpair(0x1, 0x4, 0x0, &(0x7f0000000140)) 06:31:18 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x0) 06:31:18 executing program 4: syz_open_dev$vcsn(&(0x7f00000002c0), 0x1, 0x8002) 06:31:18 executing program 1: mlock(&(0x7f0000f5b000/0x4000)=nil, 0x4000) munmap(&(0x7f0000800000/0x800000)=nil, 0x800000) 06:31:18 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000140000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:18 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) accept(r0, 0x0, 0x0) 06:31:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYRES32=r0]}) 06:31:18 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80d40, 0x0) 06:31:18 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:18 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000250000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:18 executing program 0: bpf$MAP_CREATE(0x15, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000480)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local}, {@rand_addr=0x64010102}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:18 executing program 3: socket(0xa, 0x2, 0x1f) 06:31:18 executing program 4: syz_open_dev$mouse(&(0x7f0000000040), 0xffffffffffffffff, 0x0) 06:31:18 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000630000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, 0x0, 0x0, 0x0) 06:31:19 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{0x0}, {0x0, 0xffffff7f00000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 06:31:19 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000000300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 5: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x1) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$char_usb(0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 06:31:19 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0xff) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 06:31:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) 06:31:19 executing program 4: prctl$PR_SET_SECCOMP(0x1e, 0x0, 0x0) 06:31:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8919, 0x0) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000820300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891b, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:19 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x181201, 0x0) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000850300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8940, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:19 executing program 3: mount$9p_fd(0x0, 0x0, 0x0, 0xc1a1f256969be92e, &(0x7f0000002900)=ANY=[]) 06:31:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x16, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_address={0x5, 0x8, 0x0, 0x7523bf19da64eb27, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x58}}, 0x0) 06:31:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) 06:31:19 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/smsc95xx', 0x0, 0x0) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, r0, 0x0, 0x0, 0x0}, 0x30) 06:31:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x10}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x200080c0) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000860300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000e00)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00408000000000030000000945"]}) 06:31:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:19 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 06:31:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'erspan0\x00', 0x0}) 06:31:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8918, &(0x7f0000000c40)={'syztnl0\x00', 0x0}) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000870300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x3}, {0x7ff}]}) 06:31:19 executing program 4: add_key$keyring(&(0x7f0000009340), 0x0, 0x0, 0x4000, 0xffffffffffffffff) 06:31:19 executing program 3: socket(0xa, 0x1, 0x10001) 06:31:19 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000880300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002dc0)=[@rights={{0x10}}], 0x10}, 0x0) 06:31:19 executing program 5: io_setup(0x3, &(0x7f0000000140)=0x0) io_destroy(r0) 06:31:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd7000fcdbdf25000000", @ANYRES32=0x0, @ANYBLOB="d8cd08000c00ffff0f0010000b0001"], 0x3098}}, 0x0) 06:31:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@private0, 0x0, 0x2b}, 0xa, @in=@broadcast, 0x0, 0x4}}, 0xe8) 06:31:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) read$usbfs(r0, &(0x7f00000001c0)=""/158, 0x9e) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000890300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 5: sendmsg$xdp(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="78d31e56d6712695f6c0c6afe73bd7541d3b0eb9cd14d15de3914c13ba4f5e1b9f06206296e8cc5efaa131", 0x2b}], 0x1}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram14', 0x0, 0x0) [ 913.126047] netlink: 12148 bytes leftover after parsing attributes in process `syz-executor.3'. 06:31:19 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000004c0), 0x0, 0x0) write$cgroup_type(r0, 0x0, 0x0) 06:31:19 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) 06:31:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) 06:31:19 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x2010, r0, 0x0) 06:31:19 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000008a0300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8917, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@private0}, 0x0, @in=@broadcast}}, 0xe8) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000008b0300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8902, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:20 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x81041, 0x0) 06:31:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='cdg\x00', 0x4) 06:31:20 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:20 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{0x0, 0xffffff7f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000b90300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x625, 0x1}, 0x48) 06:31:20 executing program 0: pselect6(0x40, &(0x7f0000000a40), 0x0, &(0x7f0000002340)={0x10000}, &(0x7f0000002380), 0x0) 06:31:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000ba0300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(r0, 0x0, 0x7) 06:31:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:20 executing program 3: pipe2(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000c20300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) read$usbfs(r0, 0x0, 0x0) 06:31:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x103, 0x0, 0x0) 06:31:20 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 06:31:20 executing program 3: r0 = socket(0xf, 0x3, 0x2) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x811) 06:31:20 executing program 5: prctl$PR_SET_SECCOMP(0x25, 0x0, 0x0) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000001f00000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 1: prctl$PR_SET_VMA(0x21, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 06:31:20 executing program 4: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 06:31:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, 0x0) 06:31:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3b0, 0x0, 0xc8, 0xffffffff, 0xc8, 0x318, 0x318, 0x318, 0xffffffff, 0x318, 0x318, 0x5, 0x0, {[{{@ip={@multicast2, @dev, 0x0, 0x0, 'dummy0\x00', 'bridge_slave_0\x00'}, 0x0, 0x90, 0xc8, 0x0, {}, [@common=@socket0={{0x20}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @loopback, @broadcast, @gre_key, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @private, @port, @icmp_id}}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'macsec0\x00', 'nr0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "800d"}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @multicast2, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @rand_addr, @gre_key, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 06:31:20 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)="ad") 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000932600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 1: prctl$PR_SET_MM_MAP(0x25, 0x20000000, 0xfffffffffffffffe, 0x0) 06:31:20 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 06:31:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) [ 913.983495] x_tables: duplicate underflow at hook 1 06:31:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x3, 0x0, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000942600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000400)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@broadcast, 0x0, 0x33}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 06:31:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8918, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8901, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8953, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000009d2600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 5: prctl$PR_SET_MM_MAP(0x18, 0x7f0348a22000, 0xfffffffffffffffe, 0x0) 06:31:20 executing program 0: prctl$PR_SET_SECCOMP(0x23, 0x0, &(0x7f0000000040)={0x0, 0x0}) 06:31:20 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x5523, 0x0) 06:31:20 executing program 3: prctl$PR_SET_MM_MAP(0x4, 0xe, 0xfffffffffffffffe, 0x0) 06:31:20 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000ab2600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:20 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0xfffffffffffffffe, 0x1) 06:31:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8915, &(0x7f0000000c40)={'syztnl0\x00', 0x0}) 06:31:21 executing program 5: r0 = socket(0x10, 0x2, 0x0) connect$bt_rfcomm(r0, 0x0, 0x0) 06:31:21 executing program 3: r0 = add_key$keyring(&(0x7f0000009340), &(0x7f0000009380)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 06:31:21 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000ff2700000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:21 executing program 4: socket(0x2, 0xa, 0x5) 06:31:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, 0x0, 0x0) 06:31:21 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5452, 0x1) 06:31:21 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0xffffffffffffffe1}) 06:31:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8982, 0x0) 06:31:21 executing program 4: prctl$PR_SET_MM_MAP(0x1c, 0x7f0348a22000, 0xfffffffffffffffe, 0x0) 06:31:21 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000003600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:21 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8982, 0x0) 06:31:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000400)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@broadcast}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 06:31:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@getpolicy={0x50, 0x15, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, 0x6e6bbd}}, 0x50}}, 0x0) 06:31:21 executing program 4: prctl$PR_SET_VMA(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 06:31:21 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000009000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:21 executing program 5: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 06:31:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:21 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {0x72}]}) 06:31:21 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000009600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, 0x0, 0x0) 06:31:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000480)={'ip6tnl0\x00', &(0x7f0000000400)={'sit0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 06:31:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000400)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@broadcast, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 06:31:21 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_control={0x2, {0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:21 executing program 0: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffa000/0x4000)=nil) 06:31:21 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000009700000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:21 executing program 4: pipe(&(0x7f0000000a80)) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, 0x0) 06:31:21 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1000000, &(0x7f0000000780)='\r', 0x0}, 0x48) 06:31:21 executing program 3: wait4(0x0, 0x0, 0x40000004, 0x0) 06:31:21 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000001fffffff0000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:21 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000080)) 06:31:21 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001400)='/sys/block/ram15', 0x6000, 0x0) 06:31:21 executing program 0: prctl$PR_SET_MM_MAP(0x2, 0x7f0348a22000, 0xfffffffffffffffe, 0x0) 06:31:21 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010200000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8953, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:21 executing program 1: prctl$PR_SET_SECCOMP(0x19, 0x0, 0x0) 06:31:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x0, 0x4, 0x9}, 0x48) 06:31:21 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 915.091238] usb usb7: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 06:31:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x10, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}, @sadb_spirange={0x2}]}, 0x48}}, 0x0) 06:31:22 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:22 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_async', 0x200, 0x0) 06:31:22 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000100)="d8", 0x1}], 0x2}, 0x0) 06:31:22 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) 06:31:22 executing program 3: prctl$PR_SET_TIMERSLACK(0x34, 0x9) 06:31:22 executing program 3: sendmsg$xdp(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="9221685b2004c9fa0419cebf646eec628ec8d9c6deebd787c946fc131ac8aa8bdd2a15379887c12f", 0x28}], 0x1}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram14', 0x202400, 0x0) 06:31:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a030806"], 0x30}}, 0x0) 06:31:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000000)=ANY=[@ANYRESDEC]}) 06:31:22 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 06:31:22 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010400000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:22 executing program 4: prctl$PR_GET_TSC(0x1c, &(0x7f0000000000)) 06:31:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev, {[@timestamp_prespec={0x44, 0x4}]}}}}}) 06:31:22 executing program 3: r0 = socket(0xa, 0x3, 0x2) write$bt_hci(r0, 0x0, 0x0) 06:31:22 executing program 1: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x4b49, 0x0) 06:31:22 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001d40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 06:31:22 executing program 0: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ff5000/0x9000)=nil, 0x9000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 06:31:22 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010500000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:22 executing program 4: bpf$MAP_CREATE(0x12, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:22 executing program 3: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) munmap(&(0x7f0000c00000/0x400000)=nil, 0x400000) 06:31:22 executing program 5: setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000000), 0xfffffffffffffe3a) 06:31:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x80108907, 0x0) 06:31:22 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 06:31:22 executing program 3: r0 = epoll_create1(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000380)={0x90000000}) 06:31:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40c8885) 06:31:22 executing program 1: prctl$PR_SET_TIMERSLACK(0x4, 0x9) 06:31:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0105502, 0x0) 06:31:22 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010600000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:22 executing program 3: clock_gettime(0x0, &(0x7f00000002c0)={0x0}) select(0x40, &(0x7f0000000200)={0x2}, &(0x7f0000000240)={0x5}, 0x0, &(0x7f0000000300)={r0}) 06:31:22 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[@ANYRES32=r0]}) 06:31:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:22 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='thermal_power_devfreq_get_power\x00', r0}, 0x10) 06:31:22 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010700000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:22 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080), 0x0, 0x0) 06:31:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, 0x0, 0x0) 06:31:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x73a255561c7f97b9, 0x0, 0x0, {{0x0}}}, 0x1c}}, 0x0) 06:31:23 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010800000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x2}]}) 06:31:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, 0x0) 06:31:23 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1d}]}) 06:31:23 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010900000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newspdinfo={0x14, 0x24, 0x1}, 0x14}}, 0x0) 06:31:23 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) 06:31:23 executing program 1: prctl$PR_SET_SECCOMP(0xd, 0x0, 0x0) 06:31:23 executing program 3: sendmsg$xdp(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="9221685b2004c9fa0419cebf646eec628ec8d9c6deebd787c946fc131ac8aa8bdd2a15379887c12f", 0x28}], 0x1}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram14', 0x0, 0x0) 06:31:23 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8903, 0x0) 06:31:23 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x17, &(0x7f0000000080)={0x0, 0x0, 0x87be}) 06:31:23 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010c00000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:23 executing program 5: r0 = socket(0x1e, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640), r0) 06:31:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5451, 0x1) 06:31:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) 06:31:23 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000011000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, 0x0, 0x0) 06:31:23 executing program 0: prctl$PR_SET_TIMERSLACK(0x24, 0x9) 06:31:23 executing program 5: select(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x1}, 0x0) 06:31:23 executing program 1: socket(0x10, 0x2, 0x8) 06:31:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0xe0, 0x0, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2}, {@multicast1}, {@local}, {}]}]}}}}}) 06:31:23 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) 06:31:23 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000011300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890b, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 06:31:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, 0x0, 0x0) 06:31:23 executing program 0: select(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x1}, &(0x7f0000000300)) 06:31:23 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000012300000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) 06:31:23 executing program 0: syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x200d00) 06:31:24 executing program 5: read$usbfs(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x64, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0x0, [{@multicast2}, {@multicast1, 0xffffffc0}, {@local}, {}]}]}}}}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)=ANY=[]}) 06:31:24 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x400, 0x0) 06:31:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty=0xe0, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2}, {@multicast1}, {@local}, {}]}]}}}}}) 06:31:24 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000014800000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:24 executing program 4: prctl$PR_SET_MM_MAP(0x10, 0x7ffffffff000, 0xfffffffffffffffe, 0x0) 06:31:24 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007200), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) 06:31:24 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000014c00000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x80ffff) 06:31:24 executing program 0: socketpair(0x2, 0x6, 0x10001, &(0x7f0000000000)) 06:31:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a0, 0x0) 06:31:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xa8}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty=0xe0}}}}) 06:31:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00408000000000030000000945"]}) 06:31:24 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000016800000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x18, 0x1}, 0x48) 06:31:24 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000028c0)='/sys/block/loop0', 0x0, 0x0) 06:31:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x4}, 0x48) 06:31:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000400)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@broadcast}, @in=@local, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 06:31:24 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/pstore', 0x3c480, 0x0) 06:31:24 executing program 0: r0 = socket(0x1e, 0x5, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 06:31:24 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000016c00000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:24 executing program 1: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 06:31:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:24 executing program 0: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 06:31:24 executing program 4: clock_adjtime(0x0, &(0x7f00000002c0)={0x3}) 06:31:24 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000017400000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:24 executing program 1: prctl$PR_SET_SECCOMP(0x10, 0x0, 0x0) 06:31:24 executing program 5: r0 = socket(0x10, 0x2, 0x0) write$bt_hci(r0, &(0x7f0000000040)={0x1, @set_cpb={{0x441, 0xb}}}, 0xf) 06:31:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4d, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8919, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:24 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000017a00000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000c40)={'syztnl0\x00', 0x0}) 06:31:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8915, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) read$usbfs(r0, 0x0, 0x0) 06:31:25 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x80086601, 0x0) 06:31:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@base={0x11}, 0x48) 06:31:25 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fe01000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000500)) 06:31:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$sock(r0, &(0x7f00000006c0)={&(0x7f0000000440)=@l2tp={0x2, 0x0, @broadcast}, 0x80, 0x0}, 0x0) 06:31:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:25 executing program 0: munmap(&(0x7f0000fff000/0x1000)=nil, 0x3000) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x14031, 0xffffffffffffffff, 0x0) 06:31:25 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010003000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:25 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 06:31:25 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x31d800, 0x0) 06:31:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x28}]}) 06:31:25 executing program 1: prctl$PR_GET_TSC(0x24, &(0x7f0000000000)) 06:31:25 executing program 0: prctl$PR_SET_MM(0x53564d41, 0x0, &(0x7f0000ffa000/0x4000)=nil) 06:31:25 executing program 4: add_key$keyring(&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x0, 0x0) 06:31:25 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018203000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:25 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000002d80)='ns/mnt\x00') 06:31:25 executing program 1: socket$inet6(0xa, 0x0, 0x8002) 06:31:25 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x1000000000000355}, 0x0) 06:31:25 executing program 4: socket(0x2c, 0x3, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, &(0x7f00000000c0)={0x0, 0xea60}) 06:31:25 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018503000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:25 executing program 0: prctl$PR_SET_SECCOMP(0x1c, 0x0, 0x0) 06:31:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x801) 06:31:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) 06:31:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={&(0x7f0000000540), 0xc, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="d8cd08000c00ffff0f0010000b000100666c6f7765720000180002001400620063d29613d72c1f37df2af7c132dc0fb6060005", @ANYRES32=0x0], 0x3098}}, 0x0) 06:31:25 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018603000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007200), 0x2, 0x0) read$FUSE(r0, 0x0, 0xf0ff7f00000000) 06:31:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)={0x20, "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"}) 06:31:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, 0x0, 0x0) 06:31:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8980, 0x0) 06:31:25 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:25 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8}, &(0x7f0000000100)) 06:31:25 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018703000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 919.187265] netlink: 12360 bytes leftover after parsing attributes in process `syz-executor.5'. 06:31:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:25 executing program 4: socket(0x10, 0x2, 0xa) 06:31:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018803000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 919.340697] usb usb7: usbfs: process 3601 (syz-executor.5) did not claim interface 0 before use 06:31:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0xffffffffffffffff, 0x0) 06:31:26 executing program 0: add_key$keyring(&(0x7f0000009340), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 06:31:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000e00)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="004080000000000300000009450e0000d90094"]}) 06:31:26 executing program 4: r0 = socket(0x2, 0x80803, 0x7f) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 06:31:26 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)) 06:31:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, &(0x7f0000000040)) 06:31:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8904, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018903000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002780)={&(0x7f0000002d00)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWTABLE={0x13c, 0x0, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_TABLE_USERDATA={0x59, 0x6, "3b16cb124dfa28cfa0c70b045647673a62de2fd6f5a79a6bea9388b49e8556b598c4f768b3bec1689e3ff0ed24129fd705bbdc21530473da27db5df4866477f2f073470c3af2d5397f1b9c67405f84766d5a9e33bc"}, @NFTA_TABLE_USERDATA={0xb1, 0x6, "c6658210e146e92c44d080752995c7d2e8053781326180aa330020e6eb46d1e8b746356d692378ba3bbd504377fc77119d1ad165abeb3791553691cc9988e34360e60de3f0dff86a50f4ac6f71caa72dcb54e5ca7cd809938fe0f6376d0a7cfde5c6842eb2f35914c8a6da9070db50b0e8455c388d1384136f8d49441b5fdfd11d8261dda27156bd73a84c4a8047d61aeeaa940b85090381493a31827c891d189ef39e5603bf2e1d42582ab107"}, @NFTA_TABLE_HANDLE={0xc}, @NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_DELSET={0x24, 0xb, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x15}]}, @NFT_MSG_NEWSETELEM={0xcdc, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xcc8, 0x3, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x184, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x35, 0x1, "99d4d1adb2631d5125bf7361bbae31008e9bff3f8f24293307d784feb4ef17479f009bb7f1ed5f5ec3e77003aa8e213f5c"}, @NFTA_DATA_VALUE={0x15, 0x1, "d9245d7d1a32344bef13b8c1885613a04c"}, @NFTA_DATA_VALUE={0x35, 0x1, "2af1dc17cc45a49ab84f2933618079a66c4f5d17753279b4559d380a57f86ecf7a29c9e993604abca2ad4f5b1f8fc096cf"}, @NFTA_DATA_VALUE={0x9, 0x1, "49ebaf2bf7"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x99, 0x1, "b9d5f3c2f031b6836686331fdddcf2a881671ff4d301d8f5730e16b2da5cc9258cfdd9afc1b8b56da831deb72ebfcb1947971cfec81e8080a6499117a0520fb2f247dafabf91d52baa9c894395529ff0dcc9ec3f58a1aafce6079e4dd0f15740666678e2d4f8c50db62e368fe9ed73f858481b0c02510d3f92b7c630499794e86264c2a006701d341c557e2918ac0f71e9a0ee7320"}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1ff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x20, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000001}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}]}, {0x6bc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x20}, @NFTA_SET_ELEM_EXPRESSIONS={0x2e8, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @void}}, {0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x64, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x81}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x8000}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xe}]}}}, {0x10, 0x1, 0x0, 0x1, @exthdr={{0xb}, @void}}, {0x58, 0x1, 0x0, 0x1, @fib={{0x8}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x18}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x64}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x35}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_FIB_RESULT={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xa}]}}}, {0x1e8, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1d8, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DATA={0x1c0, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4cbde1d5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xda4}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffff800}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "c5ca44ae741074151b1484dbb411b895bdeb4538d5f921ec41b182635042043b5edcc96f38024c665003054a1675f2755a0793c53c991143a0178bc8b5bfefb616644dd6cf5666c5501b347f3d1ebf18771560ea60dd9a090b31abfe23eceebcbe6ac6f66c8deb24e78a19f39280f1e7d947b9bb340a38bbde363b418c2b68695713320a0f2d6ccdf1bf697523722375edb6e109f9218fa2d41b2a68f45236eb1512e67d2aaea0712fdc259396b9e0d2a930d095ef42e4b16c78cdd65917e2c42c35e270f6eaeb16dc391351ee1bee84c41e5983b69b2b1a5fd2af595a8339e24cec6ad490"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_OP={0x8}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x54b1}, @NFTA_SET_ELEM_USERDATA={0xc4, 0x6, 0x1, 0x0, "126e6daca8f10e8480bca0e88a73aadeff55e1927544e4cc1661463f691c55df99008f66f2826a21a07735944b37640257f6521f7894b9fe7de1af438efbc87cd34e21d1582cc8bbc2c791676218dee0831f24f603c4c0075115166fcca67f7496e694af61ce1e1d7d749171360ddfc47148e1ebfe168ca45c2f909c366ef1155fcd161cfd35c20fb0c2a2b89775ece2e523fff85363b8d57df359f9ebfebee7fa07b1d419374e571d9af1afe18fa47855fba87a94561ebb7e5379c774012518"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_KEY={0x1c8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xcd, 0x1, "a95522aa433c3b87d3032c6e663a83d392a06247832439e1243dbf4e66ae1d6f616dc594421e9bb8ce85a48420fb214df5510c23a2a3b1936ebc5332f5cc14fda6882fb9b3679a2733302a04ec5b682caaced742ea4293a2505f3391d97982fa9c3a694c6e6c4595d39c4cc3b97bc0872f125445880e11876e901591911df82cb334125fc03ee30f7ada20f2b2f3b078d8d82a72bad3826b2038e413ea017c951d97f8b703c9d2d3d75d46609039c95814a42d56ecf87e855548f41ac0ef0e86893456580896226e40"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "e07af2efb706418a55d3ad8ab7492daf637fdbf57793a3e9a426dc6703a3633b2c7c057c04c7751ed4bf6d01ff1c1d524557f235b78e5f18bdbba72655eeea136fad832943c4ebee5fe0f32e3e97a88e552b15cc0f0601e168fdbb902d9a6ff28eb0476160bf13fa9bf2788e8809ccb16493d14babf6516891"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_DATA={0x118, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x50, 0x1, "65846f2c6fe1a29c4664fff570e606a17aa4cfc1fc8f61f913770d2dd9e1ac6c2bdc08f3affdadf7bdadeddd3222b5367839fba01d63ec38870a738808ec89b979a0526fd71dee56f9b48d81"}, @NFTA_DATA_VALUE={0x4e, 0x1, "c4c94e671948b05a8a9d9c46e6fdc860dfc80bdc5f52c7da5570e4d776a55176820eb55c38280d9750f0d4b4e3e3d949f1c66db66375f713c76563c725bee926059e45774ef3074ae7cf"}]}]}, {0x3a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x94, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @queue={{0xa}, @void}}, {0x44, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8}, @NFTA_META_SREG={0x8}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x1c, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x85, 0x1, "6d31ee2c20255c8b3040b34e682c8994954e2c5f5113ba1ba66bc960fbe55e22b744fc92e3cffd94314d77cb71f9c9cbe5ac37db14dbc214c4d60788886ffc0b8e8bc322cd664430237a7a53a00d3805fe3a68aba6e2d516dad2acd3e6aa53829b6cf2a452befd543d81696aa0ac85c0edfc35a55970aceddbd5a5e5fc10f347e7"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY={0x17c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x800}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xd5, 0x1, "e2f8d4b571540559442143aab05eca013941ec7c967e40dfa8e0d630c67d3f23c7d230e39c072bfe06d410754af78e82a70c5c593932bf27478374bd0ff99356df6432dac40685340c6a4818e8d4e50153f01fbfe301647c8d6429775fa65e520443194596b46fa97c6e3e43a2082680b659c50647edc9d3de3bb174dfc309a54975c262892a34a3a5b403781ffce5adce844d26790d538fc625c66b53b373683efac49cecfc674ac5d850d3198dd00333e176aee54651e220a68faf142c0710d36a37dc3e4e7ed1e9f07cf372a8e186ac"}, @NFTA_DATA_VALUE={0x38, 0x1, "2b11f96ceb22a51848f748e99e4fcbc9690b0c67d7d1c1b7bed09d071e7d7b42c05ba8a88ff5607fa5f72c9753af0f00bb3cbb6f"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x9a, 0x6, 0x1, 0x0, "9b55123e3b998609a500f0d8ff202825366bbce81716673fc6fb7a2e4b3a5feff520e2470a640b73c46fd342b6c848a8c542e007ac17a8fed4404467c259d511d9167f184d2dc9b399897644c1e391bcc514e627cb83f370396af3409fe930bca76f2b9cbccee2b816190208703fa89bad5a3de5c1ea4608a53186be65f11d7f7571e8c8cb59056062013c211766ceae4edb4fbe02f4"}, @NFTA_SET_ELEM_USERDATA={0x30, 0x6, 0x1, 0x0, "8ac53f2cf1e15193cf3e9b8d1c91bb5c2cb4cc7a755967afa27cc60f8a9a3ca3bc53535a1ca0f769ce82e2cf"}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x8c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x38, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1ff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY={0x50, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x49, 0x1, "cf9c553fdbc1dadfbbc594b124ac4b8eaf2e9742c91e5592e7ce15bda67f83abf5fa869cd726aef0ba5c95cb37155378e93b4c9e7413af879667b2eaa4ec5e6f29469dabe3"}]}]}]}]}], {0x14}}, 0xe84}}, 0x0) 06:31:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, r1) 06:31:26 executing program 5: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) msync(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x0) 06:31:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x2, 0x1) 06:31:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018a03000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:26 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) 06:31:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x34}]}) 06:31:26 executing program 5: prctl$PR_SET_MM_MAP(0xf, 0x20000000, 0xfffffffffffffffe, 0x0) 06:31:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185502, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018b03000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) bind$bt_hci(r0, 0x0, 0x0) 06:31:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001340)=@newchain={0x24, 0x64, 0x1}, 0x24}}, 0x0) 06:31:26 executing program 5: bpf$MAP_CREATE(0x14, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x11, 0x0, 0x0) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001c203000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{}, "dd30388b9b64916d", "c7ea20f29aeb9588479b98fa5463628a", "a10aa223", "e9287d61d8dd35a9"}, 0x28) 06:31:26 executing program 4: pselect6(0x40, &(0x7f0000000a40), &(0x7f0000000c80)={0x1}, &(0x7f0000002340)={0x10000}, &(0x7f0000002380), 0x0) 06:31:26 executing program 5: getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x541b, &(0x7f0000000440)) 06:31:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8902, 0x0) 06:31:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x41045508, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001e603000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:26 executing program 5: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000) 06:31:26 executing program 3: select(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x5}, 0x0, 0x0) 06:31:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 06:31:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891c, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:26 executing program 0: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x4020940d, 0x0) 06:31:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010005000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:26 executing program 3: syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x0) 06:31:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, 0x0) 06:31:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty, {[@timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{@multicast2}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty}, {@loopback}, {@local}, {@private}]}, @timestamp_addr={0x44, 0x14, 0x0, 0x1, 0x0, [{@local}, {@multicast1}]}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@dev}, {@local}]}, @rr={0x7, 0x1b, 0x0, [@multicast2, @rand_addr, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2]}]}}}}}) 06:31:26 executing program 4: bpf$MAP_CREATE(0x16, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:26 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010006000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:26 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000500)=0xbe) 06:31:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002780)={&(0x7f0000002d00)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_NEWTABLE={0x13c, 0x0, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_TABLE_USERDATA={0x5b, 0x6, "3b16cb124dfa28cfa0c70b045647673a62de2fd6f5a79a6bea9388b49e8556b598c4f768b3bec1689e3ff0ed24129fd705bbdc21530473da27db5df4866477f2f073470c3af2d5397f1b9c67405f84766d5a9e33bc19d3"}, @NFTA_TABLE_USERDATA={0xb4, 0x6, "c6658210e146e92c44d080752995c7d2e8053781326180aa330020e6eb46d1e8b746356d692378ba3bbd504377fc77119d1ad165abeb3791553691cc9988e34360e60de3f0dff86a50f4ac6f71caa72dcb54e5ca7cd809938fe0f6376d0a7cfde5c6842eb2f35914c8a6da9070db50b0e8455c388d1384136f8d49441b5fdfd11d8261dda27156bd73a84c4a8047d61aeeaa940b85090381493a31827c891d189ef39e5603bf2e1d42582ab10725d184"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELSET={0x24, 0xb, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x15}]}, @NFT_MSG_NEWSETELEM={0xcdc, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xcc8, 0x3, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x184, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x35, 0x1, "99d4d1adb2631d5125bf7361bbae31008e9bff3f8f24293307d784feb4ef17479f009bb7f1ed5f5ec3e77003aa8e213f5c"}, @NFTA_DATA_VALUE={0x15, 0x1, "d9245d7d1a32344bef13b8c1885613a04c"}, @NFTA_DATA_VALUE={0x35, 0x1, "2af1dc17cc45a49ab84f2933618079a66c4f5d17753279b4559d380a57f86ecf7a29c9e993604abca2ad4f5b1f8fc096cf"}, @NFTA_DATA_VALUE={0x9, 0x1, "49ebaf2bf7"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x99, 0x1, "b9d5f3c2f031b6836686331fdddcf2a881671ff4d301d8f5730e16b2da5cc9258cfdd9afc1b8b56da831deb72ebfcb1947971cfec81e8080a6499117a0520fb2f247dafabf91d52baa9c894395529ff0dcc9ec3f58a1aafce6079e4dd0f15740666678e2d4f8c50db62e368fe9ed73f858481b0c02510d3f92b7c630499794e86264c2a006701d341c557e2918ac0f71e9a0ee7320"}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1ff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x20, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000001}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}]}, {0x6bc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x20}, @NFTA_SET_ELEM_EXPRESSIONS={0x2e8, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @void}}, {0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x64, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x81}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x8000}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xe}]}}}, {0x10, 0x1, 0x0, 0x1, @exthdr={{0xb}, @void}}, {0x58, 0x1, 0x0, 0x1, @fib={{0x8}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x18}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x64}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x35}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_FIB_RESULT={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xa}]}}}, {0x1e8, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1d8, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DATA={0x1c0, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4cbde1d5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xda4}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffff800}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "c5ca44ae741074151b1484dbb411b895bdeb4538d5f921ec41b182635042043b5edcc96f38024c665003054a1675f2755a0793c53c991143a0178bc8b5bfefb616644dd6cf5666c5501b347f3d1ebf18771560ea60dd9a090b31abfe23eceebcbe6ac6f66c8deb24e78a19f39280f1e7d947b9bb340a38bbde363b418c2b68695713320a0f2d6ccdf1bf697523722375edb6e109f9218fa2d41b2a68f45236eb1512e67d2aaea0712fdc259396b9e0d2a930d095ef42e4b16c78cdd65917e2c42c35e270f6eaeb16dc391351ee1bee84c41e5983b69b2b1a5fd2af595a8339e24cec6ad490"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_OP={0x8}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x54b1}, @NFTA_SET_ELEM_USERDATA={0xc4, 0x6, 0x1, 0x0, "126e6daca8f10e8480bca0e88a73aadeff55e1927544e4cc1661463f691c55df99008f66f2826a21a07735944b37640257f6521f7894b9fe7de1af438efbc87cd34e21d1582cc8bbc2c791676218dee0831f24f603c4c0075115166fcca67f7496e694af61ce1e1d7d749171360ddfc47148e1ebfe168ca45c2f909c366ef1155fcd161cfd35c20fb0c2a2b89775ece2e523fff85363b8d57df359f9ebfebee7fa07b1d419374e571d9af1afe18fa47855fba87a94561ebb7e5379c774012518"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_KEY={0x1c8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xcd, 0x1, "a95522aa433c3b87d3032c6e663a83d392a06247832439e1243dbf4e66ae1d6f616dc594421e9bb8ce85a48420fb214df5510c23a2a3b1936ebc5332f5cc14fda6882fb9b3679a2733302a04ec5b682caaced742ea4293a2505f3391d97982fa9c3a694c6e6c4595d39c4cc3b97bc0872f125445880e11876e901591911df82cb334125fc03ee30f7ada20f2b2f3b078d8d82a72bad3826b2038e413ea017c951d97f8b703c9d2d3d75d46609039c95814a42d56ecf87e855548f41ac0ef0e86893456580896226e40"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "e07af2efb706418a55d3ad8ab7492daf637fdbf57793a3e9a426dc6703a3633b2c7c057c04c7751ed4bf6d01ff1c1d524557f235b78e5f18bdbba72655eeea136fad832943c4ebee5fe0f32e3e97a88e552b15cc0f0601e168fdbb902d9a6ff28eb0476160bf13fa9bf2788e8809ccb16493d14babf6516891"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_DATA={0x118, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x50, 0x1, "65846f2c6fe1a29c4664fff570e606a17aa4cfc1fc8f61f913770d2dd9e1ac6c2bdc08f3affdadf7bdadeddd3222b5367839fba01d63ec38870a738808ec89b979a0526fd71dee56f9b48d81"}, @NFTA_DATA_VALUE={0x4e, 0x1, "c4c94e671948b05a8a9d9c46e6fdc860dfc80bdc5f52c7da5570e4d776a55176820eb55c38280d9750f0d4b4e3e3d949f1c66db66375f713c76563c725bee926059e45774ef3074ae7cf"}]}]}, {0x3a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x94, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @queue={{0xa}, @void}}, {0x44, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x13}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x1c, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x85, 0x1, "6d31ee2c20255c8b3040b34e682c8994954e2c5f5113ba1ba66bc960fbe55e22b744fc92e3cffd94314d77cb71f9c9cbe5ac37db14dbc214c4d60788886ffc0b8e8bc322cd664430237a7a53a00d3805fe3a68aba6e2d516dad2acd3e6aa53829b6cf2a452befd543d81696aa0ac85c0edfc35a55970aceddbd5a5e5fc10f347e7"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY={0x17c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x800}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xd5, 0x1, "e2f8d4b571540559442143aab05eca013941ec7c967e40dfa8e0d630c67d3f23c7d230e39c072bfe06d410754af78e82a70c5c593932bf27478374bd0ff99356df6432dac40685340c6a4818e8d4e50153f01fbfe301647c8d6429775fa65e520443194596b46fa97c6e3e43a2082680b659c50647edc9d3de3bb174dfc309a54975c262892a34a3a5b403781ffce5adce844d26790d538fc625c66b53b373683efac49cecfc674ac5d850d3198dd00333e176aee54651e220a68faf142c0710d36a37dc3e4e7ed1e9f07cf372a8e186ac"}, @NFTA_DATA_VALUE={0x38, 0x1, "2b11f96ceb22a51848f748e99e4fcbc9690b0c67d7d1c1b7bed09d071e7d7b42c05ba8a88ff5607fa5f72c9753af0f00bb3cbb6f"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x9a, 0x6, 0x1, 0x0, "9b55123e3b998609a500f0d8ff202825366bbce81716673fc6fb7a2e4b3a5feff520e2470a640b73c46fd342b6c848a8c542e007ac17a8fed4404467c259d511d9167f184d2dc9b399897644c1e391bcc514e627cb83f370396af3409fe930bca76f2b9cbccee2b816190208703fa89bad5a3de5c1ea4608a53186be65f11d7f7571e8c8cb59056062013c211766ceae4edb4fbe02f4"}, @NFTA_SET_ELEM_USERDATA={0x30, 0x6, 0x1, 0x0, "8ac53f2cf1e15193cf3e9b8d1c91bb5c2cb4cc7a755967afa27cc60f8a9a3ca3bc53535a1ca0f769ce82e2cf"}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x8c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x38, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1ff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY={0x50, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x49, 0x1, "cf9c553fdbc1dadfbbc594b124ac4b8eaf2e9742c91e5592e7ce15bda67f83abf5fa869cd726aef0ba5c95cb37155378e93b4c9e7413af879667b2eaa4ec5e6f29469dabe3"}]}]}]}]}], {0x14}}, 0xe84}, 0x1, 0x0, 0x0, 0x4000c}, 0x90) 06:31:27 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) 06:31:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind(r0, 0x0, 0xffffffffffffff9d) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010007000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x1f8, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8920, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:27 executing program 0: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x9) 06:31:27 executing program 3: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') 06:31:27 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x739201, 0x0) 06:31:27 executing program 0: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010009000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x16, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x8, 0x0, 0x7523bf19da64eb27, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x38}}, 0x0) 06:31:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@base={0x5, 0x0, 0x0, 0x7ff, 0x0, 0x1}, 0x48) 06:31:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x46, 0x0, 0x0) 06:31:27 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0xffffff7f}, 0x0) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000c000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 3: r0 = socket(0x2c, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 06:31:27 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000040)) socketpair(0x0, 0x80000, 0x0, &(0x7f0000000ac0)) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010013000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 5: prctl$PR_SET_MM_MAP(0x2, 0x20000000, 0xfffffffffffffffe, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 06:31:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:31:27 executing program 0: r0 = socket(0x10, 0x2, 0x0) connect$bt_rfcomm(r0, &(0x7f00000001c0)={0x1f, @none}, 0xa) 06:31:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8981, 0x0) 06:31:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) 06:31:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:27 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x121103, 0x0) 06:31:27 executing program 0: prctl$PR_SET_SECCOMP(0x34, 0x0, &(0x7f0000000040)={0x0, 0x0}) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010020000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@base={0x5, 0x3f, 0x0, 0x7ff, 0x0, 0x1}, 0x48) 06:31:27 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x894c, 0x0) 06:31:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) add_key(&(0x7f00000000c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, r0) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010023000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 4: memfd_create(&(0x7f0000000000)='^\':]\x00', 0x4) 06:31:27 executing program 3: pselect6(0x40, &(0x7f0000000a40), &(0x7f0000000c80)={0x1}, &(0x7f0000002340)={0x10000}, 0x0, &(0x7f0000002400)={&(0x7f00000023c0), 0x8}) 06:31:27 executing program 0: getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000440)) 06:31:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000019326000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, 0x0) 06:31:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a3, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x17, 0x0, 0x0) 06:31:27 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000019426000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x0) 06:31:27 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080), 0x10) getresgid(&(0x7f0000000040), 0xfffffffffffffffc, 0x0) 06:31:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) 06:31:27 executing program 1: socket(0xa, 0x2, 0x8) 06:31:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000500)) 06:31:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25}]}) 06:31:27 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000019d26000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 3: signalfd(0xffffffffffffffff, &(0x7f0000000940), 0x8) 06:31:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'ip6_vti0\x00', 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, @private1, @loopback}}) 06:31:28 executing program 4: prctl$PR_SET_MM_MAP(0x2a, 0xe, 0xfffffffffffffffe, 0x0) 06:31:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x200080c0) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001ab26000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x5}, {0xfffe}, {}, {}, {}, {}]}) 06:31:28 executing program 5: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x40086602, 0x0) 06:31:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a1, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001003f000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 1: io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[0x0]) 06:31:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x64}]}) 06:31:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, 0x0, 0x0) 06:31:28 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff9000/0x2000)=nil, 0x2000, &(0x7f0000000080)='/dev/hwrng\x00') munmap(&(0x7f0000ff1000/0xf000)=nil, 0xf000) 06:31:28 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000040)='{:]@!\x00') 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010040000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x145840, 0x0) 06:31:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="73000000006c82558f0d76fe62ed00", @ANYRES16]}) 06:31:28 executing program 4: r0 = socket(0x2c, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xffffffffffffff40) 06:31:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000004c0)) 06:31:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, 0xfffffffffffffffb) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010048000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x40049409, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x2f, 0x7, 0x8, 0x9, 0x1b, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x7800, 0x8000, 0x4, 0x4}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x4, 0x3, 0x9, 0x800, 0x48, @local, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8, 0x87a0, 0x1, 0x1}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000580)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000680)=[{}], 0x8, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x40, 0x8000, 0x3, 0x9, {{0x15, 0x4, 0x2, 0x3, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000cc0)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001540)={0x3c8, 0x0, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x66, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x3c8}, 0x1, 0x0, 0x0, 0x90}, 0xd4534338e64f1aa3) 06:31:28 executing program 4: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)='|Y\xeb#\xb9g\x9c]\xf9L\x8d\xcf\xd0\xebk\x02V\x9d\\w\x85z\x9bC<\x8dO\xca\xf1\xcf^\",\xacY\x19\x00\xf3Gdv\xcd\xdfQ\x02D\xda\\\xec\xdb\xe4\x9b\x9c,\xa4M\"\x8f\x8d\x00\x00\x00\x80\xf4pBT\xb0e\xc4\x84\x93\x0f\xcc\xe87z\xd4\xd7o\x8a\xc7\xb7o\x9a\xfb\x02\x17C+\n\x01D\xdds\xfb&A\xfe\xfb\xe9\xd9\x12\xd0\x83\xb4\x848\xc6d2}\x8e\xdb\xfc\xc0\x80\x8c\x96O\xa9\\\x17\xa7f\xe4NL)p\xbf#\xa4m\x1e(\xfdR\xc3\xfe\x1a\xe0_x\xe3\xc7K{\x8b\x8aYl4\x8cG~\xc3\x96\xce\xe4,\xc5\x92b\x1aE\xc4O\xb1\xf2W\xb7\x94\xe6\'\xae\xdb\x9e\x13\xbf\'\r\xf4\xcf\x92H\xccH\xba\xb9\x9f\xe2\t\x87K\x06\x8b\xee\x89Q1\x9d!f=L\xd0@+\x9d\xa2h\xdes\xda-\x03\x1c\xe1w\xce\xe8P\xb5\x1d\x1f\xd9g\xc04\x8f\xd4\x18\xd3\x1cR;\xc8\b\xa1r\xf3J\xa2ea\xb5\x90\x10\xd5.\x83*1L\x8e\xbd\xab\x94\x99BF\xd5D\x9c\x83-t9snj\x06\x81\x1e6H\x9e\xce\x91\xa9d\xaf\xae\xd3\xacJ&kosW\xce\xaf3\x00d\xebo\x0f\x7f\xbd\x1f6g\x93_s\'K\r\xf3mM7\r\x9e\xd5\xe8\xf6<\xb3mB\x7f\x8a\aa)\xf1$\x93\x02\r_hq\xd6\xdb\xdf\x0fN\v\xcf\xb9P/e\xb4k\x1b\x88\xc9Y\xedwt|W\xf1f\r\t\x9e\x0f\xb9\xdd2\xcbn8\x93\xd6\xab\xf3\xe0\x9d\xd5\xf0\x06\x1b.u\xaf\xf6\xdb=\xde\xb5\x80\x90\x17ER\xdbQ\n\x9b^\xc9SD\xd9\\\xc2\xe9\xf5\f7\va\xb0\x1c\xbd\xf8\x803\xf99T\x8b\xf8 \xd1$+\x04\xf3<\xfe\x8e\xdbgb\x15L\xe1\x15=\xdc\xef\xc0tz\x99\xb4~?\xca>\xf5C\xbd\xab-!\x0e\x13\xde\x15i\x87\xe6?\x1d\r\x03r*v\x11\x9d\x94\x0fV:\xa5>0l\x1d\xdc\x7f2\"\x80F\x88\xa6\x8b\xea\xcb,\x9a\x01\xae\xc9\xdf\xb2\xdb\xa7f/+\xd9\xa8\'\x11\x95\xef_\xfa\xbd\fQw\xd1\xd6\xbf\xae\xb8\xba\xa9\x7fM\x83925\xdc%`\x03\xbbY\xd5\x1fZ@\xed\xf2\x93\xa0\x0e@\xca\x04\x8cV\x8fJ`B\xfb\xbe\x06\xcd\x0f\xce\x05\xdd\xe6\x90LV\x9c\xe6\xb1\xfeo\bG0_\xe8\xaf\x1c\xff\xb5\x15\x05\x98\xe68\x03rw\xe9\x16e#\xf1\xb0o=l3\x1f\xd0>3\xa5X\x1c\xb8Q\x96\x94\xf0\xb5\x96\xd9T\xc7\xdd\a\x83\xbb\xe68\xa3\xe3/\x8c\x06\xd8\x9a1\x8av\xa2\xb8?\x05\xaf\n;\f\x8ac\xd2\xfe\x8b\x9eO\x8b\x99\x01\xbc\xfd\xa8\xcbfm\xcd\x12\\\xac|Z>\xe0\x00~a\xd5&\xc7\x02\x9f\xa2\x1d\xb0\x02\xe3\x87\x1f\xa5\x88#\xf2\xba\xaa\xad\x91\x15x\xbf\xf1-9@6\xe5u\xf5\xaf\a\xfb,]:h\x8e4\x9c\xb2\xa6\xa7\x8e:E\xb5\xcb\xc3\x8b,\x9d\x82\x89{\xebG\xe0\xbeo\xd9U\x8d\x17\f\xdd\x93\x952\xe0\x18P\xec\xdb[\xe7\x01\x15\xb9\x03:\xec\xcdM\xe1d') 06:31:28 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) bind$bt_sco(r0, 0x0, 0x0) 06:31:28 executing program 0: bpf$MAP_CREATE(0x2, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:28 executing program 5: prctl$PR_SET_TIMERSLACK(0x37, 0x0) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001004c000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 1: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x40049409, 0x0) 06:31:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x1f8, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) 06:31:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8942, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:28 executing program 5: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 06:31:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007200), 0x2, 0x0) write$FUSE_OPEN(r0, 0x0, 0xf0ff7f00000000) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010068000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x35}]}) 06:31:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:28 executing program 1: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x12) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3) 06:31:28 executing program 5: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 06:31:28 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000002c0)={0x20000000}) 06:31:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000000)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x4}, {@in=@broadcast}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 06:31:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x80086601, 0x1) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001006c000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045515, 0x0) 06:31:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000fc0)={0xe84, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xe70, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "8d220576ce77958d286c7ff571e314c38b0652353f9afc6fc0"}}, @TIPC_NLA_NODE_REKEYING={0x8}, @TIPC_NLA_NODE_ID={0x9, 0x3, "7c0d9cf3e1"}, @TIPC_NLA_NODE_ID={0x8d, 0x3, "c586d76b660e03a8d0c4ed5ff590c6d6ff156fd1bc11bb196204c81f8b9cddbed8d2dc2b6c033013acdf068d347873ed130127f4a5630d5e7a00b23e810f00b976e84200e6e4822f1b65ab73e7cb573d26f55b1e16eb73914285a4a255dab6db537755b36c46f34ef35cb7c97bc33bc19eb7d5f30f7319a622a3a0699103b4735f8892d5562f03504f"}, @TIPC_NLA_NODE_ID={0xd7d, 0x3, "e3ebc1ec4350967825b789b4fda201093a571743b5279ded5229500c963230428ff4726733c6ed9079b09b51d6588f2c23546c5a763a3ab6ef9ab5d2309c3c6eb577069a4ffd0cf51428c9947b85e27cc1f845fda03eaf35a2cdbc4f6a3c43cf9414f1f5060364ae4cadb06aff484cf7fcd8cd5ced2fcf32254e38914f58996406cdcfedcc3ce6dc916e91ebad19493cdddb4fc82a2eac7903f5551bd840341127765e50c50e1fbb557fad296283cc84c90044f84474b99f429ddd9eea2a818220634bd1190d863cc25eb92bd0ce73790830890aff61d9ea968e0c06b8a919b7ffd00589817478e761ce099ce3ddb6c623dbcf8f34a8b577c1d09e797061b75da426efeef25814a8844ec9580721e97ca12ecfbf9e2f74631e948848b35ab0ad70434df22b9c647a60951ea980b9c89f64094c026dca54b54d7497fb12a65856fd8354d9c6e54b97c73b6e126d9535316f470f8d5b73422d4ef4d0d1b820e86ee34824c4d83f00ab53a8c00785ef2b0006ec62617648585adfa27ad94ac6a53be73c0090135b6529bf562b2402dab74727dbf392e314c909e2073c08813b42b5bbd34d32ddeeb9b3cc3834ef174701480c50f3e6c045175c15a7478f0ed6d01d9fcf7c5294375506657850e1a275f007598cca59d4c1dd4a2a22534af2a7ce89e9d9ec9ac519c4ddb2b51aa9e47781ec932b3c09ba952158eeef028210d1f1b8ee1780339c9222b529ff51ad7929d7a0a0a50dd37122737a53f83595af4448dfd8c044bb332f71f907c1e963ff8ead280323b093e57990c1312911e2e541577f745818bf1b13edf755b6059bb08506e0e8d3da84dd163553895dcaa5808280181c313353def1ec68e4d7a8ce73b92922c6fb8bdaec762c53d4a4b45739b631bbf57953952864d8d20a7af45132d9f2c990539676cb4e1154c475285cc13e486dbe2d76438fef09dd32ac9bb78e63b703ad01d0ed708c235c8189879f2b5b17955dfe45fae924f36409c61247d75bceccf56d2c6a81646a7a559e0a9f3a3bdaf6d529799795bb9e6fb8bb0e00633be3ab6439a217c97293c7d307d0f2e91989a863f27b0217da5076d89c196506dd56bbb8320fc4a856326453079e3bd8fbabf804eb7726e1f75e36d80d24066323be500f61ca441d0c19078714c8a10c1845acf909ad32085e61f28f3bc6f4c09b087b5b44e74c68d18baec7f32f75fc67e3ab07d8c1ccdcf2bfbaa152b5d1c76aff2246ecf0d28253550bfc6d205b282467996613edb67650f08de8f34d3410025596c5427bc15f7c1a2546a17606f88a30f04ce42d5c5c16e5d990328895f2f76fb8b5cebbd1b7d21d58d1027d54d777d29b4bd2c5a92d7138770441910d8e575b1e81bf60bc42427ed306849f5d0d7d96b508f5fe3fc5e78e29d181c20c7af18201d2c8bb5cab5ec48076f5c38f3ba5f09f7eb16b7f0583265f0008f7e73aea6296f956d83b472f36661d1f2b283cd6fbf68a3485a4fcfd5d98dda3e940b1c8030584ce444be8be4288592b5716ad31aca72afcfc905de2eaccbca1bdad198e05d9d8351268c729b64fe292bdd7c5b153f693dc7884df8a86b5ae19a1a89fd408835014ab32ee506c12b3d6e86416104ad7e28ba72401f44c5ccce5d01fead54d6abd16a7d230061222b6f9d533766882caeedd0297d44c736fdc4c3d268bff6b19c326680a73926a6e365ad8091872108ce9e9229ac3a33a012f79d0f10e019a9996d7acb21f5ac40d1cb898cbc3c0135198d45488211b14894dfad5d136004626099f6cc98dd63b529ff9dd844bc35e412f480c4b4cb53bf62c12ac52f3f3a99ea04f9fdc0c29dfa7e987a723425180bf943f51c2603b93402d306603830aa2f063b79e07086678b236e843237b8bbfd82efd65d907862efa44672cba5191dd11e1cc13c503f0a9bdd48c94a7c6a23768cb53382a43189f8eebfbf8c3b41b6d0b29a3a120da11eedabc4c547aa34bcd0c6ec83a8c2a4d874420d7dd4c88d4615a39add0c5311bfbd4719587dd382f8246746b48af3091f9a15d7ced95ce7fe4de0ed52a6a695ffb3b630bc23a8e6eaa72f185f245fc324d0bc1eb2ca07418955678dabba5ed18af366f4fd5f916759a00ad838d23030fe7ad0069eda9ce1957d8941396b3043b415a2bc400cd5c66f0920b36fcc9e073afcc85278fcf7bbb7b1410eb1ac31d690d0df9aa6784c9c68ef57066f8cd4e44a1e3e97a94367a9e70017ef4fb9404df0e9ac4cd8d738119bfabe662f663ee96904933f9f5bd14fe8d91a1ea5a1138cc07a5ef07f7686042305cc34d4c19482950a9c5cb74ce92283830bfa48f7f59797ebdae1723349aaf12f740ae479d1e37a9cc7da58d0542a75051dab313234b6cd6e07077ed8a7e357c8b56353d2da71be7b7762f42a06b3d085a7c86d310d8e7e1db341b53b347227577ba865a0af4f014a95405b4610f96f2fb879cb8e196684500e2aa4f43b0bef077e220ffbc993a757c1c3f6fbfcf63e058175455be2a15319ea6d69c641151e346b696ab6a0078ab1da768ea8cccc780b3b874406f5b4ae2e5265e30a7428b4865fd3386de67586b3d87ca9b7586635f24cc1c1818271352bd9c824658f78ef008d6d27d1daf19685c94999fc374c73fc84a532c843a29e93043107d4180733fbcdaad36a6c673c334b79c5aea5c09e0d1ab6329584328d03a316deeb61f12e8cd701067efbbedbaabed141ba73e3ca076afdfb5500397eadfb4c1c80991027f7f4f408c1ba979671a489d323f1b5b465d586afa401e51d9bc440ad60943a2a5d4aeb4b117287876cdd62cde08cfb42e9e1a5ba7341be3cad1f6a97f58acdca260c3c229e22e1ead65d7bff6d81812192925b2e630d7940fe711a41ca7ef51aa55c36004865023b68f1a946b6be3f52ff21be10114cafbb30e2969a378fb773a7139abb93ca2a956a4d153fea5c0d7e2c040b8d874f6168fda8c5cc3b1eb21640ca75a3f1c280ec052278a2b14714f66841c6c868158f07393209567fb2a64594afe461c0cf8eaf56e57d2e0f9fcfc8750a8f570540fd481bcde1f2123b1eafe5038a430789ce40cb9b5c6a46955901466c26ca56ccec9877e797a889cc0fee887d8a642a3e794e01dd9aa7edd071e94206aa951c5e7b11e57223f0592814cb70aaba48443696ffb9f87b8d869317cd365783d340a91a63624e5fa6079b8e1ac6e4d61f8c56cc5b0477683afc2fffd2d7d13d7e5744f04fe1eddc54a740d959d705e62e08d4cbf4c8516544488e5f7ac27db9770dd6e32feeaaa6e47b38e586dea7876ebf504dfa50814ddcab20eed72c20df18c50a5e8a9394e2096af63b04fc4e13f7572ae6c92ab1afb1c9315cc797b61fd186a315aac6729c4ef3d6555951d1ac7d786f9030e1bfc0b2133c3aa1812be3fb67857dad01ccc887a2284446284832ed3d7ac7b1108877994a786100fca6d51bd578befa1a83cfb1e9cf74598ea383f89548536261c18183efc63ffc732da042a7dcdd0c4242e56ebff5047db6ecea04f1839aae5d6f47c2a619c611e636ed4fcc76b3aaa2d0c766ff87b1a4a4375df2deff84b52233900a19eb558575b4d02b2fc5c56a565083f8d40c57e7d7cbda0f28feeb71f46bc0f0465d053f3f6da59a2ffdf257b9090ed5d882a8bcb5bdb8dae9855e4ffd51689771768bcf7874520aa07d9cfb09bb19436778eb14e368536d4bb6e534d81f945f8afc17dda7477c76f4d07bd53a44f36a30be5c0213ddc6683688de8e9c7fb9530d2339547b1fe1cdca282ad1237849f831cabfe1c51be787c5921ae7ea170cb2d3af96705a23d5ba2caed3b559e644b2b80c8ea1db725ad6de5664c41c933670f90eb5ec9b457bfc1e145f9ca47b17f136960bd4ac679f7112268c33f1cf60e4fe8fcd89783633ef55fedba67c3f6159fdb4c9bb256079e4d99ab77f45ff3b1e0c4888f800db01a4bfcb980c9cc9ec29d629d9ddf300190a699913d747e0f871c955f599fe7260f66da400d0f4186c2a286b2875e9e9a5e9c0c6fdac4034969568f05fef0439910983f3f8b09e4d077022ff8142a44e93ee517cc8916271f60563574bc2e620d6bab24c06d722a4743b906445fed39d65755bb0c534369f894be880291e7fdd44c43f29a8cd393364348be2ba07fc027e912e18127b526144e51920a1dc029424bc92141cbe8cdc2077a91eb482ce6e1b2ce513680e7709a81de404c41667fb43d179e3f13b36a8d22a575e5807be47c2e45bbe55314c652d2b3d71478d00905306f69fd39df0ca57030d42c5f5d1ab23716a1dbfec2ee3d8abc26ec5b661fa7c5f6d9884d20305a124dd80a217ab94d396fd032e09ce1e4dcbe016264d0ba342c0e736a5661a2d5fa876cdc3ac76d8875289f8425e403beb0233ee7d0eacc73972508471907d17ab862d1a94f426623c6ff908a92af43e57215b888506f78479b3b426d72ee1f66ada11bb4f239eb0300fa9adbe0b42e3a4ca9895a3755c892795734e188e4d357551de914ceedc28a83e599d69a61ea1cad5ab07a2328c5e0d1f0ebb032c367ba4ac5e04358544660160638758f4de112bbb63c0ec5bda3ae51ffd50f892436a73d8cc3006e7e42e538a6a58729dbaeffbdf5d90b2c327a0059d1c768f78a9866d5ef5ed530ca8e82818991187cda50d8d3ab2a3c32019a76540104dd319c2739690b841109138bcc15aa5d25ca1654986aa23936d3d5d1780e1bb5cafd274d61f8461fbfac2a4ab1464f7636a97258b025e2844474be2bac7dd51559ece9da185d8c70d99926f26bc030d1803b78fb825a7deb612a5cf2816fc2b911545e4d0582d4b35568807109ed35cd7fe2f0fea78242007554d95ffb69da3aa8ea213af0"}]}]}, 0xe84}}, 0x0) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010074000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$get_security(0x11, r0, 0x0, 0x0) 06:31:28 executing program 5: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x4030582a, 0x0) 06:31:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x19, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 06:31:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, &(0x7f0000000100)="8f", 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:28 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001007a000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:28 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 06:31:29 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x4c641, 0x0) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010382000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:31:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000000c0)={0x77359400}, 0x10) 06:31:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000040)="eb6426bdb048fd97d22ccda0f452bb9a267cec66b3f9cd52b3f2f7a1a495c9844e7d3345de53e6060b4870abacd717724f2a985a4bea2dfd130e120a7754f720be5cd70d958f885f11a7790e173a111b56444ffcfa53cc28a6afc4e4f9fb58354b8516844f2903a926a27bcd99a908f7d86be5c9b3f17990797e470a301f97194966b9c522257cac1a36091814b031a1ea8904235f9aa31be4790e78cae1fd43c0f11de900ec742f73f40797917651f4c8e6fc0a118e641c8ed7e68440e2834cb1511fc9fcf137f9125c7eb1f53ae3d96f0443d0f0592a3d4a1d0b8b9cc86d7c0115a0b2b14a15759b520a8155465a2a6c4b19e4ba5c4aba3640a8fc252bf57fc65d7f81554d227bcf1604aa55aa7510a89571fa35de3210eb3a23ef029fbc29e8551e0ed2d7da1648ad3872ff5f10e9a61574bd0df5b89b83064eff43fa88eec24b4735377a4cbbb0436efada30bf7c03413544ebe7e1dafaeb184db0d4e59acb9a62c79038d57cf1a4f718e8781d8094d5e78ca3fdbd4310dd28861514ede7c2dd42a690d384d721fb0b65371052527270f4ec1e3b0a788e4fac9c3a83620e919767886a40759c621c6aee3495038ff8f9a5a10e24c854c74e2b8afadef09ec000822710d5e717f2f6cf54b9a09136f5f280db02e058074a31d86dbc7f6b8fe23bf0251ab970f1f96286547a6170051ad48c36dadddd4319ace0ef74f638e20cf532e0285e7be582ad7e7a4a1ed9a4bb86e8a3e553efcf200d68886f93e63c70b78cfc160dfd924ff3cadb51c21138f6c35f3bb60a135213ca97b3e1d621f6b81d32b61cfd960c63992d14f692f22263e20f4b7f4fb4fc85001500ded97eaae12afee58de87fb407c78c0ca06b6e0c16b80115c15d8b896fe9469badb2fd6cfec71ac5e08a03c88b8189d55d2d873c125b378e91bed097e6340682ba2e3010af4a7e8a7ba69b1c20085dc4d74b9eb952e19362db36691b4c260163e98cca4f140f7ef5cb11cdeff7421bc53402d6c80aa6c935188a6660963a00ff7451badb9caeb8a2007f8d723d534aec1dee215519e65e4fc0bed5556b08db503677a430f637be8c234e0d503820447166c6ea00c90800446f8c7a0abd6931bf5ccd6a8af6da4fe5951d4d022b9fbf5ec2526d5641b3877c56414a48af5a7e66a3be3e134d96751186cb80aea51d4cedf93b008e41d101ed1367b8cd4c0c96533fec12b880e3646599a1ca831389ab6bab54e92740532534c4c0f96aee2ab78eac5d95576235c6d3ec9b74d436a85b46fbbd9ba381728528bb992686ceda80cdcfe61b4a885a916f09dd7981da552fe1b379aa3451e48e69715d80950738550d98bce66953b5a9249bb1b35bc0433ee9dc070d5e25fc9c22f28854decc1fc931da21ea98a54d4c5a089c62885ca19f370fc6a32c4c909bd6de0af71bc2eaf0846f80fcb3ed806fc890355b3771d5f60fe53a079d299cd9ccb1eca3d49f63ab3e505664ab004b2f111956a46d008cbdeb5fed035f7d76b552c5ed249733040c7cde2de24f9131d8a236c63244ab35aff9c713c458e7d9cd4fef630f995b850dc1e3311e0d8374b22a4b8e4d3a7bcb86e0711991cd3e688749b98871eb917c111afe929059decc4f3c41c252485db9060950bd958b1ac1717cde00ed889ece5b3c1c1db453c1b429a12651a68920fcee775fc1097f2d98a510bfbdd9fe81f0550eba32248b5f50ca1b51f012885d9345f57906c9fc2255ca6a82263a224406dfeb9bd9730b2540c17dacf651e05f56f4275e615efdf4dcdbdd18d93449bc6324596640d65377ca1a177d792618231faec7cf0d394f9581e34bfff951a75d7239e09caf891cada891a4de7edb9a17ba29df41261f6f51ca81489b80b73aa7018b323c19c9a00e3518b6d1536062eb7df02a6a0083fb36f08199610b1c9d4c8686e5716c44ba8fa566f09efcb347ba9ff77487ce31e71683b921b7c6980aa3ac8ae2aedba487a78e4e1c66068b9d8a50dbd46d6be8d20d6649a57d8c0a02a3dc1faac78fd0e22190d3f7485faf92a6ebbb55781dabf525c3a13c09de1ef396b64f2e63727a896291fd3fb28a41ed882d5b0162a45964df84848edb4b5b01b21522f1530e5d2b32e829b705f7fa71ca9f4cdaa9367df57eaa687c16d27c1fbae023c40d7aabe758854ce4bb925b0f9eec44d8d31074283705348c74fd0f2e51792d4684b6778d053ea57efcb25511eb9c5b16e8aa0daf184aca842d325ca8b9e0ec03012cbfc4bd9e248ae5fe0814dc46399bf8e0461630a90cf6c1c96e224cdb015faa67b3717ba6b811cebc438d7343966b1f780a6d57687217dc41d052ab65de47cbec7932334594d3785b3398976198ead0b23a21fd5de1130a8b9dbea196ccb9024fbb7903e6087f6cb0d0b63852d5e7bd8ce7b8bcefdfc25a57f90a18b3ac9e86962b2e6ad7edecca561999be1c97c047f53fb9f2eadab7c82375d2699a485a93f3fe38312ec1c6502e93b9bab91e73afe89978eda36507b7f37f993f26dc69f75d8a3fa9a74c8fcebc5c9d1ba957838616f9d87ffd960ba29491dd00f3faff0af89cd3780221867c86866cc2966fa74d4db299e2cfa828a437d59917ca87f7f05bb633efdac7767a7e13bcfeae074b655f29b3a1987c3d641947c47801a09fdbcf34bee04bc0896fe7e29242faa2d16de4b748f25ff1b80b1f64a100ac24331ba994b816e90d5096b7dce70dd444206eea5ccbfcb58e30532f96da9a2294d5049a5248571513b3666aed883b91c037ba864bf269857f698b884e1d3dbe3847540147775e23df7ebf0e9eb3a90f28336db87d41b223f9a4b26361bd4649ff459ceb7ce748400641bd53c1ff23446eb6c57bc50b9e7ad43f535b303695da63e6027fcbbb08c19aad6767862584fb7b5487a253b0024ae4566dedaff2546bd8bbf500a05c697d3d4895e382190a5bf45ca3645c7b58fd91fcd1d8883881e587c2b5aa79e5820b87ad1f9ea9a03864a5312d6d5134de5857de49f79ecd9c227214c510478139ed7d37cfbf29e5b0bcd974af4ff86cc314d835877e16330b6f402687e571bc8698ddee6b60304f3d5cc20cdd2859ad02e06d3a83f35f95c8fad7464c2daf196a213f732f5b447321d3be8cb64ab083f2630cd47cd58c39643df16b9e6df7c79822964d26cf15c161d42a58bf5e6f9edfd03bbbbf90614a188857f320e6ebb18747f67100e6fcf81fdf33d0f7d60d7a45295410cc5b116296effe700581f4c9f1a7fa40ef231169896bc12172ea3887aae884f50560719ed9309902eab2d1bd88ef37aeac87876e0feb2b20b035ba92464434056c0ab5ebb352b58750a19c8eaa1ac3e12b649142f2a05936aa4f236788e7133fa19f37e8c715cd9c8eb8acfadc2be7259aa594ba77f4a6f82bbee9c67fcff920cc609d29d9abbce46c4c23706ee49a55bc0debd9c97b168d743a7f538c2fc1822540fa481ac553b267935c4887c957e8b896af5e44cf453ca576e051b2e65ea48d7620bc74c272995cea0991cfb3ed7cbc5f68cf33060e5f4f56b6ea268adaa26d8a71156e8507450154168588ed20d1739b776f1e5da8c5de7cb2e766157849a197c1961bb3b4376a4a1f649058dcbb7bbae44df35627b8f751745e4e711186c83e414f28c1b21622b96196aa8a664303a4131bae016406bb68f484e18194ea110e44ceb70e30c70b2d1c02d24d86f2592d09d83022087b0315ad3b097e59163d5b9b271c55865cb6750b2b2823957aa627c4bce34269553fe168af45c08155134a97e8254faf9bf9cb1a5344bd178e034e7aa784cd085f48c9c87c6effe16b2d44466dbe513dcc38ee1f015e13dde021cfe133adbff68120b8c83aa1dea7a0df56644b81b7e30a4decf8193f2f1e2e64b65cd1794e3622e95456cca5a7e874fbd392743e742d9644c0123d83047845039ed9ae723191e56e5a011966f627a4c4d3314069f6a3f4f28d951c09a588a7a5e50ae269d9406a821bcd12c79c2d599108f3488be5c2c626ee180d81e5bf3756deffa3235219727492584167e54626d365ee2ca305f485eda6197bcbd7f295d00d0663adeadf289e19a8612c265e524d6b8fa0c82f930efdf7de9ee204bf493a4fc52492dd76f846eefdb613ac199ada17c59ded7d455307119ff19f7d6f2edc9ab8a6d4516f60d1b45d619879c38498b93a2efa3a555801e457739631e10cd0be86380d1888e81b5c55a8e871537e8059b7a8487a5c8439cdb3a565890442457411dc3f27b00fc937b378e93850ea8f01e0357c3532a26e0dc5c4b140fca582e6ac5cef5502a1d0c4139e6c44869e86fde6f473c5e4f979caa389e2bddee03a7332760fae33496bd3df4703674a151ec5a27fa5db739d548bac9cc5b519eab8f9d7274e9a44111cdcd83e975b872cc1c7f46e282b981bc78b18e02e88b7b9c24bd40c894bcbd201a08e7f904421942c92a3221761214972be7d38ba08e2d90d31b983f6efe88a5f71562d10f38a87877c9eede545f499b2a885a8407af01d3eee32749e528400bcfc9580723367803c216870b504197b8eedb630ae1e6b1cb1a2926a5002b6586eae1f61f1ef481f686be5a28d93743e5e26877dcc7decf9a544159bebb1d09b66a27cf965e6de188ddd5d362befc3a9dae48af83500c6533909a8650385957a6c378933c493ac29e9c8536bae2d213b90f0c572b24925a76d683093b36a4604b2420545678a5dbe379fbfb32ef3b9813663ed1e772196aecc7a971ccddbfd5cf2ab575244ad2914be4b6d169c7c3089d22e195c4210a18bca9b75669fb9100676c8a57ed6552c7b8df48b3d032d40be6097bc972519ebc77a37740dfb57cca4653fd045d5e86173e100794468b9b50e79777ed712cf2ae065861fc240ffb8692c0ae9ec8e86a0c3822d1ad67993d772a7d577615865c8388e4384165a942db894364fe2570c71b88741425b9ae411b3504d4d0265b039836e2e8f7880048cba2d5cdd9b2ae618c7116be202193005d8ad06931b76d515bbb2468431879b50945d38452371f9845f0d7337a39f58de965fc3aa2065a6a07de77001608336153d97e599aee405c8a5002510780e0fee80d265e76bce6ccda333487bffdbde0282b8e9dcd656c70c25afacaf1451ff7e6c6ab77009924052abfa6ba85c6b9e1e014de5cd85a0c9af2889b18fe92b83b38ad11a51873cb43667efbf6a9aeb3676ab913fdec0ff6f2e098d1cb619e86ff4212f11dc96fa", 0xe81}], 0x1}, 0x0) 06:31:29 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010385000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0xc) 06:31:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x2) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 06:31:29 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5460, 0x1) 06:31:29 executing program 4: prctl$PR_SET_MM_MAP(0x37, 0xe, 0xfffffffffffffffe, 0x0) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010386000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x89a0, 0x0) 06:31:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8983, 0x0) 06:31:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:29 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x2d}]}) 06:31:29 executing program 5: clock_gettime(0x1, &(0x7f00000000c0)) socket$pppl2tp(0x18, 0x1, 0x1) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010387000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x7, './file0', './file0'}}, 0x28}}, 0x0) 06:31:29 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 06:31:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8918, 0x0) 06:31:29 executing program 4: socket$inet6(0xa, 0x80803, 0xff) 06:31:29 executing program 5: prctl$PR_SET_MM_MAP(0xf, 0xe, 0xfffffffffffffffe, 0x0) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010388000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 1: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 06:31:29 executing program 4: io_setup(0x3, &(0x7f0000000000)=0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 06:31:29 executing program 1: add_key$keyring(&(0x7f0000009340), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "7cb98286e4e068d821473cc3a07897f2ae1b11124e47336c4f0671e034e0b4f517dbf326dfbe9ee7843a21bee7e086dd2dd8d5d0dd160aacae1b410ff7f32924"}, 0x48, 0xfffffffffffffffe) 06:31:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x8c}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 06:31:29 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010389000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 1: prctl$PR_SET_TIMERSLACK(0x27, 0x9) 06:31:29 executing program 3: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0xc0189436, 0x0) 06:31:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="2000020004000000f745dc7bffffffff050000000004001001000000", @ANYRES32=0x0, @ANYBLOB="20000200850700000600000005000000000000000600000003000000", @ANYRES32=0x0, @ANYBLOB="2000020001040000020000000600000008000000ff7f000003000000", @ANYRES32, @ANYBLOB="2000020000100000ff0300005789d5e0000000800800000001000000", @ANYRES32, @ANYBLOB="20000200ffff00000000000002000000010000000002000004000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3098}}, 0x0) 06:31:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, 0x0, 0x0) 06:31:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x10, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@local, @in6=@dev}}, @sadb_x_sec_ctx={0x1}, @sadb_key={0x1, 0x9}, @sadb_x_filter={0x5, 0x1a, @in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x88}}, 0x0) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001038a000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 1: bpf$MAP_CREATE(0x2, 0x0, 0xfffffffffffffe7a) 06:31:29 executing program 5: prctl$PR_SET_MM_MAP(0x26, 0xe, 0xfffffffffffffffe, 0x0) 06:31:29 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@nr_inodes}]}) 06:31:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0xfffffffffffffeec}, 0x14}}, 0x0) 06:31:29 executing program 0: prctl$PR_SET_SECCOMP(0x22, 0x0, 0x0) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001038b000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 1: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000012c0)={0x0, 0x0, 0x7}) 06:31:29 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 06:31:29 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xd, 0xfffffffffffffffe, 0x0) 06:31:29 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_destroy(r0) 06:31:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:29 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, r0, 0x0, 0x4, 0x0) 06:31:29 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000012693000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:29 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8981, 0x0) 06:31:29 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8004745a, 0x0) 06:31:29 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/ram12', 0x40, 0x0) 06:31:30 executing program 1: prctl$PR_SET_TIMERSLACK(0x21, 0x0) 06:31:30 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x1) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000012694000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x541b, 0x0) 06:31:30 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x5451, 0x0) 06:31:30 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x202000, 0x0) signalfd(r0, &(0x7f0000000040), 0x8) 06:31:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/bus/workqueue', 0x107881, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xa) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x6, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000010}, 0xc0) 06:31:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x40, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x2, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0x0, [{@multicast2}, {@multicast1}, {@local}, {}]}]}}}}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:30 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x40086602, 0x0) 06:31:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, 0x0) 06:31:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001269d000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x0) 06:31:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1e, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:30 executing program 4: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x80087601, 0x0) 06:31:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:30 executing program 3: r0 = socket(0x2, 0x80803, 0x7f) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0xf0ff7f) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000126ab000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000740)={0x0, 0x0, 0xfffffffffffffffc}, 0x0) 06:31:30 executing program 1: ustat(0x2, &(0x7f0000000000)) 06:31:30 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) 06:31:30 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000002040)) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000103c2000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_async', 0x0, 0x0) 06:31:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x4008550d, 0x0) 06:31:30 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8983, 0x0) 06:31:30 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) 06:31:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae08, 0x0) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000103e6000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xc8}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:30 executing program 0: pselect6(0x40, &(0x7f0000000a40), &(0x7f0000000c80)={0x1}, 0x0, 0x0, 0x0) 06:31:30 executing program 4: mlock2(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) 06:31:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), 0x8) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001c0ed000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 0: clock_gettime(0x0, &(0x7f00000002c0)={0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={r0}) 06:31:30 executing program 3: munmap(&(0x7f0000ff1000/0xf000)=nil, 0xf000) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap$xdp(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) 06:31:30 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045503, 0x0) 06:31:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @multicast1, @empty}}}}) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000101fe000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 5: mlock2(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 06:31:30 executing program 3: io_submit(0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000800), 0x0, 0x0) 06:31:30 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4b47, 0x1) 06:31:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8916, 0x0) 06:31:30 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010fff000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:30 executing program 5: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, 0x0) 06:31:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8912, 0x0) 06:31:31 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x80087601, 0x0) 06:31:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000040000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 1: io_setup(0x3, &(0x7f0000000000)=0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x5}]) 06:31:31 executing program 3: r0 = socket(0x2c, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0x2000000e) 06:31:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) signalfd(r0, &(0x7f0000000940), 0x8) 06:31:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000040)="eb6426bdb048fd97d22ccda0f452bb9a267cec66b3f9cd52b3f2f7a1a495c9844e7d3345de53e6060b4870abacd717724f2a985a4bea2dfd130e120a7754f720be5cd70d958f885f11a7790e173a111b56444ffcfa53cc28a6afc4e4f9fb58354b8516844f2903a926a27bcd99a908f7d86be5c9b3f17990797e470a301f97194966b9c522257cac1a36091814b031a1ea8904235f9aa31be4790e78cae1fd43c0f11de900ec742f73f40797917651f4c8e6fc0a118e641c8ed7e68440e2834cb1511fc9fcf137f9125c7eb1f53ae3d96f0443d0f0592a3d4a1d0b8b9cc86d7c0115a0b2b14a15759b520a8155465a2a6c4b19e4ba5c4aba3640a8fc252bf57fc65d7f81554d227bcf1604aa55aa7510a89571fa35de3210eb3a23ef029fbc29e8551e0ed2d7da1648ad3872ff5f10e9a61574bd0df5b89b83064eff43fa88eec24b4735377a4cbbb0436efada30bf7c03413544ebe7e1dafaeb184db0d4e59acb9a62c79038d57cf1a4f718e8781d8094d5e78ca3fdbd4310dd28861514ede7c2dd42a690d384d721fb0b65371052527270f4ec1e3b0a788e4fac9c3a83620e919767886a40759c621c6aee3495038ff8f9a5a10e24c854c74e2b8afadef09ec000822710d5e717f2f6cf54b9a09136f5f280db02e058074a31d86dbc7f6b8fe23bf0251ab970f1f96286547a6170051ad48c36dadddd4319ace0ef74f638e20cf532e0285e7be582ad7e7a4a1ed9a4bb86e8a3e553efcf200d68886f93e63c70b78cfc160dfd924ff3cadb51c21138f6c35f3bb60a135213ca97b3e1d621f6b81d32b61cfd960c63992d14f692f22263e20f4b7f4fb4fc85001500ded97eaae12afee58de87fb407c78c0ca06b6e0c16b80115c15d8b896fe9469badb2fd6cfec71ac5e08a03c88b8189d55d2d873c125b378e91bed097e6340682ba2e3010af4a7e8a7ba69b1c20085dc4d74b9eb952e19362db36691b4c260163e98cca4f140f7ef5cb11cdeff7421bc53402d6c80aa6c935188a6660963a00ff7451badb9caeb8a2007f8d723d534aec1dee215519e65e4fc0bed5556b08db503677a430f637be8c234e0d503820447166c6ea00c90800446f8c7a0abd6931bf5ccd6a8af6da4fe5951d4d022b9fbf5ec2526d5641b3877c56414a48af5a7e66a3be3e134d96751186cb80aea51d4cedf93b008e41d101ed1367b8cd4c0c96533fec12b880e3646599a1ca831389ab6bab54e92740532534c4c0f96aee2ab78eac5d95576235c6d3ec9b74d436a85b46fbbd9ba381728528bb992686ceda80cdcfe61b4a885a916f09dd7981da552fe1b379aa3451e48e69715d80950738550d98bce66953b5a9249bb1b35bc0433ee9dc070d5e25fc9c22f28854decc1fc931da21ea98a54d4c5a089c62885ca19f370fc6a32c4c909bd6de0af71bc2eaf0846f80fcb3ed806fc890355b3771d5f60fe53a079d299cd9ccb1eca3d49f63ab3e505664ab004b2f111956a46d008cbdeb5fed035f7d76b552c5ed249733040c7cde2de24f9131d8a236c63244ab35aff9c713c458e7d9cd4fef630f995b850dc1e3311e0d8374b22a4b8e4d3a7bcb86e0711991cd3e688749b98871eb917c111afe929059decc4f3c41c252485db9060950bd958b1ac1717cde00ed889ece5b3c1c1db453c1b429a12651a68920fcee775fc1097f2d98a510bfbdd9fe81f0550eba32248b5f50ca1b51f012885d9345f57906c9fc2255ca6a82263a224406dfeb9bd9730b2540c17dacf651e05f56f4275e615efdf4dcdbdd18d93449bc6324596640d65377ca1a177d792618231faec7cf0d394f9581e34bfff951a75d7239e09caf891cada891a4de7edb9a17ba29df41261f6f51ca81489b80b73aa7018b323c19c9a00e3518b6d1536062eb7df02a6a0083fb36f08199610b1c9d4c8686e5716c44ba8fa566f09efcb347ba9ff77487ce31e71683b921b7c6980aa3ac8ae2aedba487a78e4e1c66068b9d8a50dbd46d6be8d20d6649a57d8c0a02a3dc1faac78fd0e22190d3f7485faf92a6ebbb55781dabf525c3a13c09de1ef396b64f2e63727a896291fd3fb28a41ed882d5b0162a45964df84848edb4b5b01b21522f1530e5d2b32e829b705f7fa71ca9f4cdaa9367df57eaa687c16d27c1fbae023c40d7aabe758854ce4bb925b0f9eec44d8d31074283705348c74fd0f2e51792d4684b6778d053ea57efcb25511eb9c5b16e8aa0daf184aca842d325ca8b9e0ec03012cbfc4bd9e248ae5fe0814dc46399bf8e0461630a90cf6c1c96e224cdb015faa67b3717ba6b811cebc438d7343966b1f780a6d57687217dc41d052ab65de47cbec7932334594d3785b3398976198ead0b23a21fd5de1130a8b9dbea196ccb9024fbb7903e6087f6cb0d0b63852d5e7bd8ce7b8bcefdfc25a57f90a18b3ac9e86962b2e6ad7edecca561999be1c97c047f53fb9f2eadab7c82375d2699a485a93f3fe38312ec1c6502e93b9bab91e73afe89978eda36507b7f37f993f26dc69f75d8a3fa9a74c8fcebc5c9d1ba957838616f9d87ffd960ba29491dd00f3faff0af89cd3780221867c86866cc2966fa74d4db299e2cfa828a437d59917ca87f7f05bb633efdac7767a7e13bcfeae074b655f29b3a1987c3d641947c47801a09fdbcf34bee04bc0896fe7e29242faa2d16de4b748f25ff1b80b1f64a100ac24331ba994b816e90d5096b7dce70dd444206eea5ccbfcb58e30532f96da9a2294d5049a5248571513b3666aed883b91c037ba864bf269857f698b884e1d3dbe3847540147775e23df7ebf0e9eb3a90f28336db87d41b223f9a4b26361bd4649ff459ceb7ce748400641bd53c1ff23446eb6c57bc50b9e7ad43f535b303695da63e6027fcbbb08c19aad6767862584fb7b5487a253b0024ae4566dedaff2546bd8bbf500a05c697d3d4895e382190a5bf45ca3645c7b58fd91fcd1d8883881e587c2b5aa79e5820b87ad1f9ea9a03864a5312d6d5134de5857de49f79ecd9c227214c510478139ed7d37cfbf29e5b0bcd974af4ff86cc314d835877e16330b6f402687e571bc8698ddee6b60304f3d5cc20cdd2859ad02e06d3a83f35f95c8fad7464c2daf196a213f732f5b447321d3be8cb64ab083f2630cd47cd58c39643df16b9e6df7c79822964d26cf15c161d42a58bf5e6f9edfd03bbbbf90614a188857f320e6ebb18747f67100e6fcf81fdf33d0f7d60d7a45295410cc5b116296effe700581f4c9f1a7fa40ef231169896bc12172ea3887aae884f50560719ed9309902eab2d1bd88ef37aeac87876e0feb2b20b035ba92464434056c0ab5ebb352b58750a19c8eaa1ac3e12b649142f2a05936aa4f236788e7133fa19f37e8c715cd9c8eb8acfadc2be7259aa594ba77f4a6f82bbee9c67fcff920cc609d29d9abbce46c4c23706ee49a55bc0debd9c97b168d743a7f538c2fc1822540fa481ac553b267935c4887c957e8b896af5e44cf453ca576e051b2e65ea48d7620bc74c272995cea0991cfb3ed7cbc5f68cf33060e5f4f56b6ea268adaa26d8a71156e8507450154168588ed20d1739b776f1e5da8c5de7cb2e766157849a197c1961bb3b4376a4a1f649058dcbb7bbae44df35627b8f751745e4e711186c83e414f28c1b21622b96196aa8a664303a4131bae016406bb68f484e18194ea110e44ceb70e30c70b2d1c02d24d86f2592d09d83022087b0315ad3b097e59163d5b9b271c55865cb6750b2b2823957aa627c4bce34269553fe168af45c08155134a97e8254faf9bf9cb1a5344bd178e034e7aa784cd085f48c9c87c6effe16b2d44466dbe513dcc38ee1f015e13dde021cfe133adbff68120b8c83aa1dea7a0df56644b81b7e30a4decf8193f2f1e2e64b65cd1794e3622e95456cca5a7e874fbd392743e742d9644c0123d83047845039ed9ae723191e56e5a011966f627a4c4d3314069f6a3f4f28d951c09a588a7a5e50ae269d9406a821bcd12c79c2d599108f3488be5c2c626ee180d81e5bf3756deffa3235219727492584167e54626d365ee2ca305f485eda6197bcbd7f295d00d0663adeadf289e19a8612c265e524d6b8fa0c82f930efdf7de9ee204bf493a4fc52492dd76f846eefdb613ac199ada17c59ded7d455307119ff19f7d6f2edc9ab8a6d4516f60d1b45d619879c38498b93a2efa3a555801e457739631e10cd0be86380d1888e81b5c55a8e871537e8059b7a8487a5c8439cdb3a565890442457411dc3f27b00fc937b378e93850ea8f01e0357c3532a26e0dc5c4b140fca582e6ac5cef5502a1d0c4139e6c44869e86fde6f473c5e4f979caa389e2bddee03a7332760fae33496bd3df4703674a151ec5a27fa5db739d548bac9cc5b519eab8f9d7274e9a44111cdcd83e975b872cc1c7f46e282b981bc78b18e02e88b7b9c24bd40c894bcbd201a08e7f904421942c92a3221761214972be7d38ba08e2d90d31b983f6efe88a5f71562d10f38a87877c9eede545f499b2a885a8407af01d3eee32749e528400bcfc9580723367803c216870b504197b8eedb630ae1e6b1cb1a2926a5002b6586eae1f61f1ef481f686be5a28d93743e5e26877dcc7decf9a544159bebb1d09b66a27cf965e6de188ddd5d362befc3a9dae48af83500c6533909a8650385957a6c378933c493ac29e9c8536bae2d213b90f0c572b24925a76d683093b36a4604b2420545678a5dbe379fbfb32ef3b9813663ed1e772196aecc7a971ccddbfd5cf2ab575244ad2914be4b6d169c7c3089d22e195c4210a18bca9b75669fb9100676c8a57ed6552c7b8df48b3d032d40be6097bc972519ebc77a37740dfb57cca4653fd045d5e86173e100794468b9b50e79777ed712cf2ae065861fc240ffb8692c0ae9ec8e86a0c3822d1ad67993d772a7d577615865c8388e4384165a942db894364fe2570c71b88741425b9ae411b3504d4d0265b039836e2e8f7880048cba2d5cdd9b2ae618c7116be202193005d8ad06931b76d515bbb2468431879b50945d38452371f9845f0d7337a39f58de965fc3aa2065a6a07de77001608336153d97e599aee405c8a5002510780e0fee80d265e76bce6ccda333487bffdbde0282b8e9dcd656c70c25afacaf1451ff7e6c6ab77009924052abfa6ba85c6b9e1e014de5cd85a0c9af2889b18fe92b83b38ad11a51873cb43667efbf6a9aeb3676ab913fdec0ff6f2e098d1cb619e86ff4212f11dc96fa", 0xe81}], 0x1}, 0x4000060) 06:31:31 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) 06:31:31 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045518, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000100000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 5: prctl$PR_SET_SECCOMP(0x2b, 0x0, 0x0) 06:31:31 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000, 0x0) 06:31:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3e, 0x0, 0x0) 06:31:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001ffff1f0000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 06:31:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x74}]}) 06:31:31 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffa000/0x4000)=nil) 06:31:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x3, 0xe9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000400000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, 0x0, 0x0) 06:31:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:31 executing program 1: r0 = socket(0xa, 0x3, 0x1f) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:31:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002780)={&(0x7f0000002d00)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWTABLE={0x13c, 0x0, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_TABLE_USERDATA={0x5b, 0x6, "3b16cb124dfa28cfa0c70b045647673a62de2fd6f5a79a6bea9388b49e8556b598c4f768b3bec1689e3ff0ed24129fd705bbdc21530473da27db5df4866477f2f073470c3af2d5397f1b9c67405f84766d5a9e33bc19d3"}, @NFTA_TABLE_USERDATA={0xb4, 0x6, "c6658210e146e92c44d080752995c7d2e8053781326180aa330020e6eb46d1e8b746356d692378ba3bbd504377fc77119d1ad165abeb3791553691cc9988e34360e60de3f0dff86a50f4ac6f71caa72dcb54e5ca7cd809938fe0f6376d0a7cfde5c6842eb2f35914c8a6da9070db50b0e8455c388d1384136f8d49441b5fdfd11d8261dda27156bd73a84c4a8047d61aeeaa940b85090381493a31827c891d189ef39e5603bf2e1d42582ab10725d184"}, @NFTA_TABLE_HANDLE={0xc}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELSET={0x24, 0xb, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x15}]}, @NFT_MSG_NEWSETELEM={0xcdc, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xcc8, 0x3, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x184, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x35, 0x1, "99d4d1adb2631d5125bf7361bbae31008e9bff3f8f24293307d784feb4ef17479f009bb7f1ed5f5ec3e77003aa8e213f5c"}, @NFTA_DATA_VALUE={0x15, 0x1, "d9245d7d1a32344bef13b8c1885613a04c"}, @NFTA_DATA_VALUE={0x35, 0x1, "2af1dc17cc45a49ab84f2933618079a66c4f5d17753279b4559d380a57f86ecf7a29c9e993604abca2ad4f5b1f8fc096cf"}, @NFTA_DATA_VALUE={0x9, 0x1, "49ebaf2bf7"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x99, 0x1, "b9d5f3c2f031b6836686331fdddcf2a881671ff4d301d8f5730e16b2da5cc9258cfdd9afc1b8b56da831deb72ebfcb1947971cfec81e8080a6499117a0520fb2f247dafabf91d52baa9c894395529ff0dcc9ec3f58a1aafce6079e4dd0f15740666678e2d4f8c50db62e368fe9ed73f858481b0c02510d3f92b7c630499794e86264c2a006701d341c557e2918ac0f71e9a0ee7320"}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1ff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x20, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000001}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}]}, {0x6bc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x20}, @NFTA_SET_ELEM_EXPRESSIONS={0x2e8, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @void}}, {0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x64, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x81}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x8000}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xe}]}}}, {0x10, 0x1, 0x0, 0x1, @exthdr={{0xb}, @void}}, {0x58, 0x1, 0x0, 0x1, @fib={{0x8}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x18}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x64}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x35}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_FIB_RESULT={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xa}]}}}, {0x1e8, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1d8, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DATA={0x1c0, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xda4}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffff800}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "c5ca44ae741074151b1484dbb411b895bdeb4538d5f921ec41b182635042043b5edcc96f38024c665003054a1675f2755a0793c53c991143a0178bc8b5bfefb616644dd6cf5666c5501b347f3d1ebf18771560ea60dd9a090b31abfe23eceebcbe6ac6f66c8deb24e78a19f39280f1e7d947b9bb340a38bbde363b418c2b68695713320a0f2d6ccdf1bf697523722375edb6e109f9218fa2d41b2a68f45236eb1512e67d2aaea0712fdc259396b9e0d2a930d095ef42e4b16c78cdd65917e2c42c35e270f6eaeb16dc391351ee1bee84c41e5983b69b2b1a5fd2af595a8339e24cec6ad490"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_OP={0x8}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x54b1}, @NFTA_SET_ELEM_USERDATA={0xc4, 0x6, 0x1, 0x0, "126e6daca8f10e8480bca0e88a73aadeff55e1927544e4cc1661463f691c55df99008f66f2826a21a07735944b37640257f6521f7894b9fe7de1af438efbc87cd34e21d1582cc8bbc2c791676218dee0831f24f603c4c0075115166fcca67f7496e694af61ce1e1d7d749171360ddfc47148e1ebfe168ca45c2f909c366ef1155fcd161cfd35c20fb0c2a2b89775ece2e523fff85363b8d57df359f9ebfebee7fa07b1d419374e571d9af1afe18fa47855fba87a94561ebb7e5379c774012518"}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_KEY={0x1c8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xcd, 0x1, "a95522aa433c3b87d3032c6e663a83d392a06247832439e1243dbf4e66ae1d6f616dc594421e9bb8ce85a48420fb214df5510c23a2a3b1936ebc5332f5cc14fda6882fb9b3679a2733302a04ec5b682caaced742ea4293a2505f3391d97982fa9c3a694c6e6c4595d39c4cc3b97bc0872f125445880e11876e901591911df82cb334125fc03ee30f7ada20f2b2f3b078d8d82a72bad3826b2038e413ea017c951d97f8b703c9d2d3d75d46609039c95814a42d56ecf87e855548f41ac0ef0e86893456580896226e40"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "e07af2efb706418a55d3ad8ab7492daf637fdbf57793a3e9a426dc6703a3633b2c7c057c04c7751ed4bf6d01ff1c1d524557f235b78e5f18bdbba72655eeea136fad832943c4ebee5fe0f32e3e97a88e552b15cc0f0601e168fdbb902d9a6ff28eb0476160bf13fa9bf2788e8809ccb16493d14babf6516891"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_DATA={0x118, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x50, 0x1, "65846f2c6fe1a29c4664fff570e606a17aa4cfc1fc8f61f913770d2dd9e1ac6c2bdc08f3affdadf7bdadeddd3222b5367839fba01d63ec38870a738808ec89b979a0526fd71dee56f9b48d81"}, @NFTA_DATA_VALUE={0x4e, 0x1, "c4c94e671948b05a8a9d9c46e6fdc860dfc80bdc5f52c7da5570e4d776a55176820eb55c38280d9750f0d4b4e3e3d949f1c66db66375f713c76563c725bee926059e45774ef3074ae7cf"}]}]}, {0x3a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x94, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @queue={{0xa}, @void}}, {0x44, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x13}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x1c, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x85, 0x1, "6d31ee2c20255c8b3040b34e682c8994954e2c5f5113ba1ba66bc960fbe55e22b744fc92e3cffd94314d77cb71f9c9cbe5ac37db14dbc214c4d60788886ffc0b8e8bc322cd664430237a7a53a00d3805fe3a68aba6e2d516dad2acd3e6aa53829b6cf2a452befd543d81696aa0ac85c0edfc35a55970aceddbd5a5e5fc10f347e7"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY={0x17c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x800}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xd5, 0x1, "e2f8d4b571540559442143aab05eca013941ec7c967e40dfa8e0d630c67d3f23c7d230e39c072bfe06d410754af78e82a70c5c593932bf27478374bd0ff99356df6432dac40685340c6a4818e8d4e50153f01fbfe301647c8d6429775fa65e520443194596b46fa97c6e3e43a2082680b659c50647edc9d3de3bb174dfc309a54975c262892a34a3a5b403781ffce5adce844d26790d538fc625c66b53b373683efac49cecfc674ac5d850d3198dd00333e176aee54651e220a68faf142c0710d36a37dc3e4e7ed1e9f07cf372a8e186ac"}, @NFTA_DATA_VALUE={0x38, 0x1, "2b11f96ceb22a51848f748e99e4fcbc9690b0c67d7d1c1b7bed09d071e7d7b42c05ba8a88ff5607fa5f72c9753af0f00bb3cbb6f"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x9a, 0x6, 0x1, 0x0, "9b55123e3b998609a500f0d8ff202825366bbce81716673fc6fb7a2e4b3a5feff520e2470a640b73c46fd342b6c848a8c542e007ac17a8fed4404467c259d511d9167f184d2dc9b399897644c1e391bcc514e627cb83f370396af3409fe930bca76f2b9cbccee2b816190208703fa89bad5a3de5c1ea4608a53186be65f11d7f7571e8c8cb59056062013c211766ceae4edb4fbe02f4"}, @NFTA_SET_ELEM_USERDATA={0x30, 0x6, 0x1, 0x0, "8ac53f2cf1e15193cf3e9b8d1c91bb5c2cb4cc7a755967afa27cc60f8a9a3ca3bc53535a1ca0f769ce82e2cf"}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x8c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x38, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY={0x50, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x49, 0x1, "cf9c553fdbc1dadfbbc594b124ac4b8eaf2e9742c91e5592e7ce15bda67f83abf5fa869cd726aef0ba5c95cb37155378e93b4c9e7413af879667b2eaa4ec5e6f29469dabe3"}]}]}]}]}], {0x14}}, 0xe84}}, 0x0) 06:31:31 executing program 0: prctl$PR_SET_MM_MAP(0xf, 0x7ffffffff000, 0xfffffffffffffffe, 0x0) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000100000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 4: madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x10) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 06:31:31 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/config', 0x2626c0, 0x0) 06:31:31 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)="ad62") 06:31:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x58}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:31 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0xb0da4825a2f396c1) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000200000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0xf0ff7f}, 0x0) 06:31:31 executing program 5: prctl$PR_SET_TIMERSLACK(0x38, 0x0) 06:31:31 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8902, 0x0) 06:31:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a0, &(0x7f0000000c40)={'syztnl0\x00', 0x0}) 06:31:31 executing program 1: socketpair(0x10, 0x2, 0x7e6, &(0x7f0000000000)) 06:31:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000300000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x9, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x8, 0x0, 0x1b, @private0, @local, 0x0, 0x8000}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x8000, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x3, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102}]}]}}}}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x10, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x6e6bbc, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@local, @in6=@dev}}, @sadb_x_sec_ctx={0x1}, @sadb_key={0x1, 0x9}, @sadb_x_filter={0x5, 0x1a, @in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x88}}, 0x0) 06:31:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:31 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, 0x0, 0x0) 06:31:31 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000400000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:31 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r0, 0x0, 0x0, 0x0) capget(&(0x7f0000000140)={0x20080522, r0}, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:31:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, 0x0, 0x0) 06:31:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x0, 0x0, 0x0, 0x0, "20e591a7e8115444faaf8c4486f0d9655c15b14eae93f9b47f964081cc4767d78aa1d43946a9b141890f71bb4473429da732c9bc5973da43f784c12f67e988bbae9b5df4ce9c085f7e755aa5561ce628"}, 0xd8) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000500000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 1: bpf$MAP_CREATE(0x4, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 06:31:32 executing program 0: r0 = getpid() r1 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1}) 06:31:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f0000000100)) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000600000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 1: pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000fed000/0x12000)=nil, 0x12000) 06:31:32 executing program 3: prctl$PR_SET_SECCOMP(0x2a, 0x0, &(0x7f0000000040)={0x0, 0x0}) 06:31:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000700000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) 06:31:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {0x61}]}) 06:31:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x40049409, 0x1) 06:31:32 executing program 0: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x12) 06:31:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0105512, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:32 executing program 4: r0 = epoll_create1(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000400)) 06:31:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000800000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0x0, &(0x7f0000000080)=0xfffffcbc) 06:31:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x5, 0x0, 0x0) 06:31:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000900000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000002080), 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000002040)) 06:31:32 executing program 5: prctl$PR_SET_SECCOMP(0x27, 0x0, 0x0) 06:31:32 executing program 1: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000300)='|Y\xeb#\xb9g\x9c]\xf9L\x8d\xcf\xd0\xebk\x02V\x9d\\w\x85z\x9bC<\x8dO\xca\xf1\xcf^\",\xacY\x19\x00\xf3Gdv\xcd\xdfQ\x02D\xda\\\xec\xdb\xe4\x9b\x9c,\xa4M\"\x8f\x8d\x00\x00\x00\x80\xf4pBT\xb0e\xc4\x84\x93\x0f\xcc\xe87z\xd4\xd7o\x8a\xc7\xb7o\x9a\xfb\x02\x17C+\n\x01D\xdds\xfb&A\xfe\xfb\xe9\xd9\x12\xd0\x83\xb4\x848\xc6d2}\x8e\xdb\xfc\xc0\x80\x8c\x96O\xa9\\\x17\xa7f\xe4NL)p\xbf#\xa4m\x1e(\xfdR\xc3\xfe\x1a\xe0_x\xe3\xc7K{\x8b\x8aYl4\x8cG~\xc3\x96\xce\xe4,\xc5\x92b\x1aE\xc4O\xb1\xf2W\xb7\x94\xe6\'\xae\xdb\x9e\x13\xbf\'\r\xf4\xcf\x92H\xccH\xba\xb9\x9f\xe2\t\x87K\x06\x8b\xee\x89Q1\x9d!f=L\xd0@+\x9d\xa2h\xdes\xda-\x03\x1c\xe1w\xce\xe8P\xb5\x1d\x1f\xd9g\xc04\x8f\xd4\x18\xd3\x1cR;\xc8\b\xa1r\xf3J\xa2ea\xb5\x90\x10\xd5.\x83*1L\x8e\xbd\xab\x94\x99BF\xd5D\x9c\x83-t9snj\x06\x81\x1e6H\x9e\xce\x91\xa9d\xaf\xae\xd3\xacJ&kosW\xce\xaf3\x00d\xebo\x0f\x7f\xbd\x1f6g\x93_s\'K\r\xf3mM7\r\x9e\xd5\xe8\xf6<\xb3mB\x7f\x8a\aa)\xf1$\x93\x02\r_hq\xd6\xdb\xdf\x0fN\v\xcf\xb9P/e\xb4k\x1b\x88\xc9Y\xedwt|W\xf1f\r\t\x9e\x0f\xb9\xdd2\xcbn8\x93\xd6\xab\xf3\xe0\x9d\xd5\xf0\x06\x1b.u\xaf\xf6\xdb=\xde\xb5\x80\x90\x17ER\xdbQ\n\x9b^\xc9SD\xd9\\\xc2\xe9\xf5\f7\va\xb0\x1c\xbd\xf8\x803\xf99T\x8b\xf8 \xd1$+\x04\xf3<\xfe\x8e\xdbgb\x15L\xe1\x15=\xdc\xef\xc0tz\x99\xb4~?\xca>\xf5C\xbd\xab-!\x0e\x13\xde\x15i\x87\xe6?\x1d\r\x03r*v\x11\x9d\x94\x0fV:\xa5>0l\x1d\xdc\x7f2\"\x80F\x88\xa6\x8b\xea\xcb,\x9a\x01\xae\xc9\xdf\xb2\xdb\xa7f/+\xd9\xa8\'\x11\x95\xef_\xfa\xbd\fQw\xd1\xd6\xbf\xae\xb8\xba\xa9\x7fM\x83925\xdc%`\x03\xbbY\xd5\x1fZ@\xed\xf2\x93\xa0\x0e@\xca\x04\x8cV\x8fJ`B\xfb\xbe\x06\xcd\x0f\xce\x05\xdd\xe6\x90LV\x9c\xe6\xb1\xfeo\bG0_\xe8\xaf\x1c\xff\xb5\x15\x05\x98\xe68\x03rw\xe9\x16e#\xf1\xb0o=l3\x1f\xd0>3\xa5X\x1c\xb8Q\x96\x94\xf0\xb5\x96\xd9T\xc7\xdd\a\x83\xbb\xe68\xa3\xe3/\x8c\x06\xd8\x9a1\x8av\xa2\xb8?\x05\xaf\n;\f\x8ac\xd2\xfe\x8b\x9eO\x8b\x99\x01\xbc\xfd\xa8\xcbfm\xcd\x12\\\xac|Z>\xe0\x00~a\xd5&\xc7\x02\x9f\xa2\x1d\xb0\x02\xe3\x87\x1f\xa5\x88#\xf2\xba\xaa\xad\x91\x15x\xbf\xf1-9@6\xe5u\xf5\xaf\a\xfb,]:h\x8e4\x9c\xb2\xa6\xa7\x8e:E\xb5\xcb\xc3\x8b,\x9d\x82\x89{\xebG\xe0\xbeo\xd9U\x8d\x17\f\xdd\x93\x952\xe0\x18P\xec\xdb[\xe7\x01\x15\xb9\x03:\xec\xcdM\xe1d') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000040)='{:]@!\x00') 06:31:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 925.792373] usb usb7: usbfs: process 4449 (syz-executor.3) did not claim interface 3 before use 06:31:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:32 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007200), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f0000002440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}, {}, {}, {}]}}) 06:31:32 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x80487436, 0x0) 06:31:32 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) 06:31:32 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r0, 0x0, 0x0, 0x0) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000c00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}], [{@permit_directio}]}}) 06:31:32 executing program 0: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x1000000) 06:31:32 executing program 4: r0 = socket(0xf, 0x3, 0x2) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, 0x0) 06:31:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000001300000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 1: setresuid(0xee00, 0xee00, 0xee00) setresuid(0x0, 0xee00, 0xee00) 06:31:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 06:31:32 executing program 4: rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:31:32 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) 06:31:32 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@huge_within_size}]}) 06:31:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x40085511, 0x0) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000002000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 3: prctl$PR_SET_SECCOMP(0x2a, 0x0, 0x0) 06:31:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2d, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:32 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x4020940d, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:32 executing program 0: bpf$MAP_CREATE(0x10, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000002300000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:32 executing program 1: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x9}) 06:31:32 executing program 4: prctl$PR_SET_TIMERSLACK(0xd, 0x0) 06:31:32 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) 06:31:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8919, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000c40)={'syztnl0\x00', 0x0}) 06:31:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x80108907, 0x0) 06:31:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000003f00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8940, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0xf0ff7f}}, 0x0) 06:31:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8}]}) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000004000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000001a80)) 06:31:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:33 executing program 1: modify_ldt$write(0x1, &(0x7f0000000040)={0xc00a}, 0x10) 06:31:33 executing program 3: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0) 06:31:33 executing program 4: socketpair(0x11, 0x2, 0x4, &(0x7f0000000000)) 06:31:33 executing program 5: prctl$PR_SET_MM_MAP(0x17, 0x7f0348a22000, 0xfffffffffffffffe, 0x0) 06:31:33 executing program 0: pipe(&(0x7f0000000a80)) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, &(0x7f00000000c0)={0x0, 0xea60}) 06:31:33 executing program 1: prctl$PR_SET_TIMERSLACK(0x38, 0x9) 06:31:33 executing program 3: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5421, 0x0) 06:31:33 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000200)="3ad2", 0x2, 0xffff}], 0x0, 0x0) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000004800000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x0) 06:31:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x78) 06:31:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002780)={&(0x7f0000002d00)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_NEWTABLE={0x13c, 0x0, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_TABLE_USERDATA={0x5b, 0x6, "3b16cb124dfa28cfa0c70b045647673a62de2fd6f5a79a6bea9388b49e8556b598c4f768b3bec1689e3ff0ed24129fd705bbdc21530473da27db5df4866477f2f073470c3af2d5397f1b9c67405f84766d5a9e33bc19d3"}, @NFTA_TABLE_USERDATA={0xb4, 0x6, "c6658210e146e92c44d080752995c7d2e8053781326180aa330020e6eb46d1e8b746356d692378ba3bbd504377fc77119d1ad165abeb3791553691cc9988e34360e60de3f0dff86a50f4ac6f71caa72dcb54e5ca7cd809938fe0f6376d0a7cfde5c6842eb2f35914c8a6da9070db50b0e8455c388d1384136f8d49441b5fdfd11d8261dda27156bd73a84c4a8047d61aeeaa940b85090381493a31827c891d189ef39e5603bf2e1d42582ab10725d184"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELSET={0x24, 0xb, 0xa, 0x0, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x15}]}, @NFT_MSG_NEWSETELEM={0xcdc, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xcc8, 0x3, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY_END={0x184, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x35, 0x1, "99d4d1adb2631d5125bf7361bbae31008e9bff3f8f24293307d784feb4ef17479f009bb7f1ed5f5ec3e77003aa8e213f5c"}, @NFTA_DATA_VALUE={0x15, 0x1, "d9245d7d1a32344bef13b8c1885613a04c"}, @NFTA_DATA_VALUE={0x35, 0x1, "2af1dc17cc45a49ab84f2933618079a66c4f5d17753279b4559d380a57f86ecf7a29c9e993604abca2ad4f5b1f8fc096cf"}, @NFTA_DATA_VALUE={0x9, 0x1, "49ebaf2bf7"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x99, 0x1, "b9d5f3c2f031b6836686331fdddcf2a881671ff4d301d8f5730e16b2da5cc9258cfdd9afc1b8b56da831deb72ebfcb1947971cfec81e8080a6499117a0520fb2f247dafabf91d52baa9c894395529ff0dcc9ec3f58a1aafce6079e4dd0f15740666678e2d4f8c50db62e368fe9ed73f858481b0c02510d3f92b7c630499794e86264c2a006701d341c557e2918ac0f71e9a0ee7320"}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1ff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x20, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000001}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}]}, {0x6bc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x20}, @NFTA_SET_ELEM_EXPRESSIONS={0x2e8, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @void}}, {0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x64, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x81}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x8000}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xe}]}}}, {0x10, 0x1, 0x0, 0x1, @exthdr={{0xb}, @void}}, {0x58, 0x1, 0x0, 0x1, @fib={{0x8}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FIB_FLAGS={0x8}, @NFTA_FIB_FLAGS={0x8}, @NFTA_FIB_FLAGS={0x8}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_RESULT={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xa}]}}}, {0x1e8, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1d8, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DATA={0x1c0, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4cbde1d5}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xda4}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffff800}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}]}, @NFTA_DATA_VALUE={0xeb, 0x1, "c5ca44ae741074151b1484dbb411b895bdeb4538d5f921ec41b182635042043b5edcc96f38024c665003054a1675f2755a0793c53c991143a0178bc8b5bfefb616644dd6cf5666c5501b347f3d1ebf18771560ea60dd9a090b31abfe23eceebcbe6ac6f66c8deb24e78a19f39280f1e7d947b9bb340a38bbde363b418c2b68695713320a0f2d6ccdf1bf697523722375edb6e109f9218fa2d41b2a68f45236eb1512e67d2aaea0712fdc259396b9e0d2a930d095ef42e4b16c78cdd65917e2c42c35e270f6eaeb16dc391351ee1bee84c41e5983b69b2b1a5fd2af595a8339e24cec6ad490b5e2"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_BITWISE_OP={0x8}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x54b1}, @NFTA_SET_ELEM_USERDATA={0xc4, 0x6, 0x1, 0x0, "126e6daca8f10e8480bca0e88a73aadeff55e1927544e4cc1661463f691c55df99008f66f2826a21a07735944b37640257f6521f7894b9fe7de1af438efbc87cd34e21d1582cc8bbc2c791676218dee0831f24f603c4c0075115166fcca67f7496e694af61ce1e1d7d749171360ddfc47148e1ebfe168ca45c2f909c366ef1155fcd161cfd35c20fb0c2a2b89775ece2e523fff85363b8d57df359f9ebfebee7fa07b1d419374e571d9af1afe18fa47855fba87a94561ebb7e5379c774012518"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_KEY={0x1c8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xd0, 0x1, "a95522aa433c3b87d3032c6e663a83d392a06247832439e1243dbf4e66ae1d6f616dc594421e9bb8ce85a48420fb214df5510c23a2a3b1936ebc5332f5cc14fda6882fb9b3679a2733302a04ec5b682caaced742ea4293a2505f3391d97982fa9c3a694c6e6c4595d39c4cc3b97bc0872f125445880e11876e901591911df82cb334125fc03ee30f7ada20f2b2f3b078d8d82a72bad3826b2038e413ea017c951d97f8b703c9d2d3d75d46609039c95814a42d56ecf87e855548f41ac0ef0e86893456580896226e40199adf"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xe2fd7f48e1c1d368}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "e07af2efb706418a55d3ad8ab7492daf637fdbf57793a3e9a426dc6703a3633b2c7c057c04c7751ed4bf6d01ff1c1d524557f235b78e5f18bdbba72655eeea136fad832943c4ebee5fe0f32e3e97a88e552b15cc0f0601e168fdbb902d9a6ff28eb0476160bf13fa9bf2788e8809ccb16493d14babf6516891"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_DATA={0x118, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1000}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "65846f2c6fe1a29c4664fff570e606a17aa4cfc1fc8f61f913770d2dd9e1ac6c2bdc08f3affdadf7bdadeddd3222b5367839fba01d63ec38870a738808ec89b979a0526fd71dee56f9"}, @NFTA_DATA_VALUE={0x4e, 0x1, "c4c94e671948b05a8a9d9c46e6fdc860dfc80bdc5f52c7da5570e4d776a55176820eb55c38280d9750f0d4b4e3e3d949f1c66db66375f713c76563c725bee926059e45774ef3074ae7cf"}]}]}, {0x3a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x94, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @queue={{0xa}, @void}}, {0x44, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x13}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x10}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x1c, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x7f}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x85, 0x1, "6d31ee2c20255c8b3040b34e682c8994954e2c5f5113ba1ba66bc960fbe55e22b744fc92e3cffd94314d77cb71f9c9cbe5ac37db14dbc214c4d60788886ffc0b8e8bc322cd664430237a7a53a00d3805fe3a68aba6e2d516dad2acd3e6aa53829b6cf2a452befd543d81696aa0ac85c0edfc35a55970aceddbd5a5e5fc10f347e7"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY={0x17c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x800}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xd5, 0x1, "e2f8d4b571540559442143aab05eca013941ec7c967e40dfa8e0d630c67d3f23c7d230e39c072bfe06d410754af78e82a70c5c593932bf27478374bd0ff99356df6432dac40685340c6a4818e8d4e50153f01fbfe301647c8d6429775fa65e520443194596b46fa97c6e3e43a2082680b659c50647edc9d3de3bb174dfc309a54975c262892a34a3a5b403781ffce5adce844d26790d538fc625c66b53b373683efac49cecfc674ac5d850d3198dd00333e176aee54651e220a68faf142c0710d36a37dc3e4e7ed1e9f07cf372a8e186ac"}, @NFTA_DATA_VALUE={0x38, 0x1, "2b11f96ceb22a51848f748e99e4fcbc9690b0c67d7d1c1b7bed09d071e7d7b42c05ba8a88ff5607fa5f72c9753af0f00bb3cbb6f"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x9a, 0x6, 0x1, 0x0, "9b55123e3b998609a500f0d8ff202825366bbce81716673fc6fb7a2e4b3a5feff520e2470a640b73c46fd342b6c848a8c542e007ac17a8fed4404467c259d511d9167f184d2dc9b399897644c1e391bcc514e627cb83f370396af3409fe930bca76f2b9cbccee2b816190208703fa89bad5a3de5c1ea4608a53186be65f11d7f7571e8c8cb59056062013c211766ceae4edb4fbe02f4"}, @NFTA_SET_ELEM_USERDATA={0x2d, 0x6, 0x1, 0x0, "8ac53f2cf1e15193cf3e9b8d1c91bb5c2cb4cc7a755967afa27cc60f8a9a3ca3bc53535a1ca0f769ce"}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x8c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x38, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1ff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY={0x50, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x49, 0x1, "cf9c553fdbc1dadfbbc594b124ac4b8eaf2e9742c91e5592e7ce15bda67f83abf5fa869cd726aef0ba5c95cb37155378e93b4c9e7413af879667b2eaa4ec5e6f29469dabe3"}]}]}]}]}], {0x14}}, 0xe84}, 0x1, 0x0, 0x0, 0x4000c}, 0x90) 06:31:33 executing program 0: bpf$MAP_CREATE(0xd, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:33 executing program 5: munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x3000) 06:31:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8938, &(0x7f0000000040)={'wg1\x00', @ifru_data=0x0}) 06:31:33 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x80000001}, 0x8) 06:31:33 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram14', 0x2a2400, 0x0) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000004c00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) 06:31:33 executing program 0: prctl$PR_SET_MM_MAP(0x10, 0x20000000, 0xfffffffffffffffe, 0x0) 06:31:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000005ac0)) 06:31:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}]}) 06:31:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000006800000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) 06:31:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000006c00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 5: io_cancel(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:31:33 executing program 4: prctl$PR_SET_MM_MAP(0x2b, 0xe, 0xfffffffffffffffe, 0x0) 06:31:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip_vti0\x00', &(0x7f0000000bc0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000007400000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) 06:31:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 06:31:33 executing program 5: utimes(0x0, &(0x7f0000000080)) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000007a00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8953, 0x0) 06:31:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, 0x0, 0x0) 06:31:33 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8701, 0x0) 06:31:33 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5411, &(0x7f0000000200)={'syztnl0\x00', 0x0}) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038200000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8917, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:33 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/software', 0x0, 0x0) connect$bt_rfcomm(r0, 0x0, 0x0) 06:31:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty=0xe0000000, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2}, {@multicast1}, {@local}, {}]}]}}}}}) 06:31:33 executing program 0: r0 = add_key$keyring(&(0x7f0000009340), &(0x7f0000009380)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "7cb98286e4e068d821473cc3a07897f2ae1b11124e47336c4f0671e034e0b4f517dbf326dfbe9ee7843a21bee7e086dd2dd8d5d0dd160aacae1b410ff7f32924"}, 0x48, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r3, 0x0) 06:31:33 executing program 5: r0 = socket(0x2c, 0x3, 0x0) accept4$bt_l2cap(r0, 0x0, 0x0, 0x0) 06:31:33 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038500000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:33 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x80047437, 0x0) 06:31:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@base={0x11, 0x0, 0x0, 0x7}, 0x48) 06:31:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3a, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:34 executing program 5: prctl$PR_SET_TIMERSLACK(0x35, 0x9) 06:31:34 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038600000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:34 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/LNXSYSTM:00', 0x0, 0x0) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 06:31:34 executing program 1: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000040)='{:]@!\x00') 06:31:34 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:31:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8949, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:34 executing program 3: clock_gettime(0x0, &(0x7f00000002c0)={0x0}) select(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x1}, &(0x7f0000000300)={r0}) 06:31:34 executing program 4: clock_gettime(0x4, &(0x7f00000010c0)) 06:31:34 executing program 0: pipe(&(0x7f0000000a80)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pipe(&(0x7f0000000a80)) select(0x40, &(0x7f0000000000)={0x971}, 0x0, 0x0, 0x0) 06:31:34 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038700000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@private0, 0x0, 0x2b}, 0xa, @in=@broadcast}}, 0xe8) 06:31:34 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) 06:31:34 executing program 4: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 06:31:34 executing program 0: prctl$PR_SET_SECCOMP(0x29, 0x0, 0x0) 06:31:34 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038800000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:34 executing program 5: rt_sigaction(0x9, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000380)) 06:31:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 06:31:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc00c5512, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0xc0045878, 0x1) 06:31:35 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x254003, 0x0) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038900000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8995, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8904, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038a00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004551e, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, 0x0) 06:31:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f3, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2}, {@multicast1}, {@local}, {}]}]}}}}}) 06:31:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, &(0x7f0000000c40)={'syztnl0\x00', 0x0}) 06:31:35 executing program 3: io_setup(0x7ff, &(0x7f0000000040)) 06:31:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000340)={&(0x7f0000000140), 0xffffffffffffffaf, &(0x7f0000000300)={&(0x7f0000000240)={0xfffffffffffffcd0, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}, ["", ""]}, 0x68}}, 0x0) 06:31:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000008c0)) 06:31:35 executing program 1: pipe2(&(0x7f0000000840)={0xffffffffffffffff}, 0x0) read$FUSE(r0, 0x0, 0x0) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000038b00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 4: clock_gettime(0x0, &(0x7f0000000500)={0x0}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, 0x0, &(0x7f0000000540)={r0}) 06:31:35 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4d}]}) 06:31:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, 0x0, 0x0) 06:31:35 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) read$usbfs(r0, &(0x7f0000000340)=""/4096, 0x1000) 06:31:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000240)="d0"}) 06:31:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @local}}) 06:31:35 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{0x0}, {0x0, 0xf0ff7f00000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 06:31:35 executing program 3: bpf$MAP_CREATE(0x13, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001ffffff8c00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 5: utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) 06:31:35 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) 06:31:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@private0, 0x0, 0x2b}, 0x0, @in=@broadcast}}, 0xe8) 06:31:35 executing program 1: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ff4000/0x2000)=nil) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000269300000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 0: prctl$PR_SET_TIMERSLACK(0xe, 0x0) 06:31:35 executing program 4: prctl$PR_SET_TIMERSLACK(0x24, 0x0) 06:31:35 executing program 1: msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000002, 0xffffffffffffffff) 06:31:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x0, 0x1}, 0x14}}, 0x40) 06:31:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x7ff0bdbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000269400000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}}}, 0xb8}}, 0x0) 06:31:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a1, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 06:31:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000006, 0x22011, r0, 0x0) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000269d00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x80087601, 0x1) 06:31:35 executing program 3: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5460, 0x0) 06:31:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), 0xffffffffffffffff) 06:31:35 executing program 1: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)='{:]@!\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 06:31:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000026ab00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 06:31:35 executing program 3: prctl$PR_SET_VMA(0x8, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 06:31:35 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r0, 0x0, 0x0, 0x0) capget(&(0x7f0000000140)={0x20080522, r0}, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(0xffffffffffffffff, 0x4068aea3, 0x0) sched_setscheduler(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:31:35 executing program 4: r0 = socket(0x10, 0x2, 0xa) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:31:35 executing program 1: prctl$PR_SET_SECCOMP(0x2c, 0x0, 0x0) 06:31:35 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000edc000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:35 executing program 0: prctl$PR_SET_VMA(0x1d, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 06:31:35 executing program 3: r0 = socket(0x10, 0x2, 0xa) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) 06:31:35 executing program 1: r0 = socket(0xf, 0x3, 0x2) accept4$bt_l2cap(r0, 0x0, 0x0, 0x0) 06:31:35 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc00c5512, 0x0) 06:31:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x1fe, 0x0, &(0x7f0000ffc000/0x4000)=nil}) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000003c200000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891b, &(0x7f0000000c40)={'syztnl0\x00', 0x0}) 06:31:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15}]}) 06:31:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007200), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r1) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000003e600000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x9, 0x0, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x0, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@multicast2}, {@multicast1}, {@local}, {}]}]}}}}}) 06:31:36 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 06:31:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r0) 06:31:36 executing program 3: r0 = socket(0x10, 0x2, 0xa) sendmsg$xdp(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="2bd4fce7459a90e7722eaf7f2320459eddef85b880f8bdb97a21a44a046c2576b8d471", 0x23}, {&(0x7f0000000100)="d8", 0x1}], 0x2}, 0x0) 06:31:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8915, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fffffff500000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x20000040, &(0x7f0000000040)=[{}, {0x2}]}) 06:31:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8912, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x64010102, @empty}}}}) 06:31:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fffffff600000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4, 0x0, &(0x7f0000000080)) 06:31:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x9, {{0x15, 0x4, 0x2, 0x3, 0x54, 0x64, 0x0, 0x9, 0x4, 0x0, @broadcast, @empty, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x17, 0x1d, [@loopback, @broadcast, @multicast1, @remote, @broadcast]}, @timestamp_prespec={0x44, 0x24, 0x28, 0x3, 0xb, [{@multicast2, 0x7}, {@multicast1, 0xffffffc0}, {@local, 0xfffffffb}, {@rand_addr=0x64010102, 0x8}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 06:31:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:36 executing program 1: bpf$MAP_CREATE(0x17, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:36 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect$nfc_raw(r0, &(0x7f00000000c0), 0x10) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fffffffb00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r0, &(0x7f00000007c0)={0x2c, 0x14}, 0x10) 06:31:36 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80d40, 0x0) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000000)='./file0\x00') 06:31:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:36 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fffffdfc00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 0: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 06:31:36 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/profiling', 0x30240, 0x0) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fffffdfd00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 5: prctl$PR_SET_MM_MAP(0x1d, 0xe, 0xfffffffffffffffe, 0x0) 06:31:36 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security', 0x24040, 0x0) 06:31:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0xffffffff, 0xd0, 0x308, 0xd0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@eui64={{0x28}}, @common=@frag={{0x30}}]}, @common=@unspec=@AUDIT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], [], 'hsr0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x150, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "402ddb4ea8dea7392d36d15ae1c4e63f3658ecedfe5a7958e233b192f38f"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 06:31:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x3, 0xe9, 0x0, 0x1}, 0x48) 06:31:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:36 executing program 0: prctl$PR_GET_TSC(0x18, &(0x7f0000000000)) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000001fe00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 06:31:36 executing program 3: prctl$PR_SET_MM_MAP(0xf, 0x1ffff000, 0xfffffffffffffffe, 0x0) 06:31:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8917, 0x0) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fffffffe00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$bt_rfcomm(r0, 0x0, 0x0) 06:31:36 executing program 1: bpf$MAP_CREATE(0x6, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:36 executing program 4: prctl$PR_SET_VMA(0xe, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 06:31:36 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x0) 06:31:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, 0x0) 06:31:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000bc0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYBLOB="0040009002"]}) 06:31:36 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000fff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:36 executing program 1: r0 = socket(0x2, 0x80803, 0x7f) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r0) 06:31:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000440)) 06:31:36 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, 0x0}, 0x68) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 06:31:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x8941, &(0x7f0000000440)) 06:31:37 executing program 5: syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x88242) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001001fffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000180)) 06:31:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, 0x0, 0x0) 06:31:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, 0x0) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fcfdffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) 06:31:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x80108906, 0x0) 06:31:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8902, &(0x7f0000000c40)={'tunl0\x00', 0x0}) 06:31:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:37 executing program 4: r0 = socket(0xa, 0x3, 0x4) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, 0x0, 0x0) 06:31:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="25434be690a1b4d2bd6d9707e2e6011d", 0x10) 06:31:37 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 06:31:37 executing program 0: r0 = socket(0x1e, 0x5, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:31:37 executing program 5: prctl$PR_SET_MM_MAP(0x53564d41, 0xe, 0xfffffffffffffffe, 0x0) 06:31:37 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007200), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}, {}, {}, {}]}}) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fdfdffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f0000000280)) 06:31:37 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f00000074c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:31:37 executing program 0: prctl$PR_SET_VMA(0x24, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 06:31:37 executing program 5: r0 = socket(0x10, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000017fffffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001a00)=@buf={0x50, &(0x7f0000001900)="82cc84bd94af793fb236dbe87c328f5f88a7bdc754af30f07ab2cd67cbeb47d3944c57501fa506b482b772305df3be6e8b2a6a8d4e3ce57e7d6a32af5fb307c31d0f8e5b201c2a710ebe8cea1f1c5e7a"}) 06:31:37 executing program 3: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) 06:31:37 executing program 1: prctl$PR_SET_MM_MAP(0x2, 0x20000000, 0xfffffffffffffffe, 0x0) 06:31:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0105502, &(0x7f0000000180)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, 0x0, 0x0) 06:31:37 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x88242) write$cgroup_type(r0, 0x0, 0x0) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000018cffffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bb0, 0x2}}, 0xb8}}, 0x0) 06:31:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x1) r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="6f158129b498ac61273ca24f55da7d315ff7288c48e1f4a3e09af64e9466e2bf9244c589d44fb1ab59c8e36c0c00b50ba31268164e8550215554b489582e99843534b91745ac6f22f75da1ed96", 0x4d) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 06:31:37 executing program 1: pipe2(0x0, 0x104000) 06:31:37 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000004"]) 06:31:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001f5ffffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 06:31:37 executing program 1: setfsuid(0xee01) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 06:31:37 executing program 3: prctl$PR_SET_MM_MAP(0x2f, 0xe, 0xfffffffffffffffe, 0x0) 06:31:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890c, 0x0) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001f6ffffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 5: prctl$PR_SET_TIMERSLACK(0x36, 0x0) 06:31:37 executing program 1: socketpair(0x2, 0x5, 0x0, &(0x7f00000005c0)) 06:31:37 executing program 3: syz_open_dev$mouse(&(0x7f0000000800), 0x0, 0x0) 06:31:37 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000004"]) 06:31:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:37 executing program 5: r0 = memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5452, 0x0) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001fbffffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newspdinfo={0x24, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x24}}, 0x0) 06:31:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8994, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:37 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram14', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 06:31:37 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001feffffff00000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045518, 0x0) 06:31:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a0, &(0x7f0000000200)={'syztnl2\x00', 0x0}) 06:31:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000000840)=ANY=[@ANYBLOB="983000006400110026bd7000fcdbdf25000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3098}}, 0x0) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000c0ed0000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 931.401136] netlink: 12140 bytes leftover after parsing attributes in process `syz-executor.1'. 06:31:38 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000004"]) 06:31:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, 0x0, 0x0) 06:31:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x3, 0xe9, 0x400, 0x1}, 0x48) 06:31:38 executing program 4: sendmsg$xdp(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="9221685b2004c9fa0419cebf646eec628ec8d9c6deebd787c946fc131ac8aa8bdd2a15379887c12f38", 0x29}], 0x1}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram14', 0x202400, 0x0) 06:31:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x16, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_address={0x5, 0x8, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x58}}, 0x0) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000100400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007200), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfsroot}]}}) 06:31:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xfffffffffffffdb5, &(0x7f00000005c0)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000400400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 06:31:38 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/tcp_cubic', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000380)={0x20000000}) 06:31:38 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000004"]) 06:31:38 executing program 1: bpf$MAP_CREATE(0x9, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:38 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x5421, 0x0) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001ffffffffffff0700400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:38 executing program 4: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 06:31:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[]}) 06:31:38 executing program 1: memfd_create(&(0x7f0000000000)='^\':]\x00', 0x0) 06:31:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @private1}}) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000001000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:38 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x0) 06:31:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @multicast1, {[@generic={0x0, 0x11, "1b2c97b6c7e3a005fed86f49d81d53"}, @generic={0x0, 0xd, "3511024219d74ac00c2bad"}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@multicast2}]}, @timestamp_prespec={0x44, 0x4c, 0x0, 0x3, 0x0, [{@broadcast}, {@loopback}, {@local}, {@multicast2}, {}, {@local}, {@private}, {@broadcast}, {@multicast1}]}, @rr={0x7, 0x7, 0x0, [@broadcast]}]}}}}}) 06:31:38 executing program 1: rt_sigqueueinfo(0xffffffffffffffff, 0x1b, &(0x7f0000000180)={0x0, 0x0, 0x4}) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000004000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:38 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x40049409, 0x0) 06:31:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, 0x0, 0x0) 06:31:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x100000000001, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004550d, 0x0) 06:31:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a1, 0x0) 06:31:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:38 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x462000, 0x0) 06:31:38 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 06:31:38 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r0, 0x8907, 0x0) 06:31:38 executing program 0: clock_adjtime(0x0, &(0x7f0000000300)={0x4}) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000001400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 06:31:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, 0x0, 0x0) 06:31:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, 0x0, 0x0) 06:31:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$char_usb(0xffffffffffffffff, 0x0, 0x0) 06:31:38 executing program 5: bpf$MAP_CREATE(0x7, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:38 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000002400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e) 06:31:38 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg$unix(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000016c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 06:31:39 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x14843, 0x0) 06:31:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x1e8, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x318, 0x318, 0x318, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xd0}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, [], [], 'batadv_slave_0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 06:31:39 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/bus/acpi', 0x453082, 0x0) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000003400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 3: bpf$MAP_CREATE(0x8, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 06:31:39 executing program 4: prctl$PR_SET_TIMERSLACK(0x1b, 0x0) 06:31:39 executing program 0: sysinfo(&(0x7f0000000000)=""/121) 06:31:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f00000009c0)={'gre0\x00', 0x0}) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000004400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x8, 0xfffffdfd, &(0x7f0000000380)=[@decrefs], 0x0, 0x0, 0x0}) 06:31:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@gettaction={0x20, 0x1e, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 06:31:39 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=';'}) 06:31:39 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:39 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000012c0)={0x50, 0x0, &(0x7f0000000240)=[@exit_looper, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000005400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x42, 0x0) [ 932.571868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 932.588340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 06:31:39 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x400c620e, 0x0) 06:31:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x11, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:39 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="b2", 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5421, &(0x7f0000000040)) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000006400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 932.674714] ieee802154 phy0 wpan0: encryption failed: -22 [ 932.680364] ieee802154 phy1 wpan1: encryption failed: -22 06:31:39 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="cc"}) 06:31:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x0) 06:31:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f00000009c0)={'gre0\x00', 0x0}) [ 932.717250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 06:31:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 06:31:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x2, &(0x7f0000000040)) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000007400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x26, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@gettaction={0x20, 0x32, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 06:31:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000010000108000000000000000007000003"], 0x37fe0}}, 0x0) 06:31:39 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f0000000080)=[@request_death], 0x0, 0x0, 0x0}) 06:31:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0xc0189436, &(0x7f0000000040)) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000008400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@gettaction={0x20, 0x10, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) [ 932.880123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 932.910095] tc_dump_action: action bad kind 06:31:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000140)=0x1000000, 0x4) 06:31:39 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000700)='ns/user\x00') 06:31:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}}, 0x0) 06:31:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8917, &(0x7f0000000040)) 06:31:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000140)=0xffffffff, 0x4) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000009400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 06:31:39 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) 06:31:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "88ef1450151f7806d26357e95b3470ca37849c2b92c93a263cea07ad1b8c0af8b84f70dfc170edbd052d501652158a93f95343f711257342b8504a19525d1e"}, 0x60) 06:31:39 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc00c620f, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000000c400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0xc, 0x0, &(0x7f0000000380)=[@decrefs, @enter_looper], 0x1, 0x0, &(0x7f0000000480)='}'}) 06:31:39 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x4c, 0x0, &(0x7f0000000540)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000600)="04d9e384"}) 06:31:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x8, 0x4) 06:31:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x11, 0x201}, 0x14}}, 0x0) 06:31:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xfff3}}}, 0x24}}, 0x0) 06:31:39 executing program 4: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) 06:31:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@delchain={0x24, 0x65, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 06:31:39 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000013400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:39 executing program 0: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 06:31:39 executing program 4: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x4dbbb69ec720572e, 0x0) 06:31:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40049409, &(0x7f0000000040)) 06:31:39 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000020400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) 06:31:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8907, 0x0) 06:31:40 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x60, 0x0, &(0x7f0000000280)=[@request_death, @free_buffer, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000023400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x11, &(0x7f0000000000)="fa73a23c", 0x4) 06:31:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x1, &(0x7f0000000080)=@raw=[@kfunc], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:31:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000010000108000000000000000007000080"], 0x40}}, 0x0) 06:31:40 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, 0x0) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000003f400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046210, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) 06:31:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000140), 0x4) 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8935, &(0x7f0000000040)) 06:31:40 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4018620d, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000040400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 933.522934] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 06:31:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x16, 0x201}, 0x14}}, 0x0) 06:31:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:31:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, 0x0, &(0x7f0000000080)) 06:31:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="98000000320001000000000000000000000000000800040009000000380001"], 0x98}}, 0x0) 06:31:40 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4020940d, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f0000003080)={0xe84, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xe70, 0x3, 0x0, 0x1, [{0x204, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_DATA={0xd4, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x65, 0x1, "9c85f8825e39914718e2b21b5defd05ea20cd1fc4d5c83c3bea920294e89bde35cabc0e3853d7fb176c2b735e5c63d4b26c2df0e6188a9030bfe7215670acc1dbc5f52af4155db71394d16eca9d5328500218cacbfc1c26d97168b8d93ee1d2b8b"}, @NFTA_DATA_VALUE={0x65, 0x1, "80a899856bac11bb550a7bf74799c02300160353ae5463b7ded65a5b8f5df5aa181fa8d28cec6d21211e6dbf1f55c1aeb5a0accd806d8b202ad300124ebeb487b5b4e479452486581d91f2a70bc2731166ce60813e84f162d9faffa3306c34660d"}]}, @NFTA_SET_ELEM_USERDATA={0xd1, 0x6, 0x1, 0x0, "d0dff7aeeece613717031048f19c919a35c079ab31a31f371fd3443820dbb1209645f9707931ab5649f0c86621b4ef7f0a433947de345e4f135b53fa653021de70c156d5a112e43b121dd5527c0b658ab80c6c3da277547adee170f50c49c62f90edfd258bc79afd48bdb02a242cdda61923074842c106d174d365a6b49139428291d21d84d9d3f606014d149da9ddb1b165626166828aedbcdc1d82ea95f43f1b3f5c46fd09f3b73a7e12ae2d49535455f2d4400136e78983fef8855aa9900fc5635bbc531cd17b70705cf035"}, @NFTA_SET_ELEM_DATA={0x40, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}, {0x6e0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x690, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x18, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x4}}}, {0x650, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x640, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8}, @NFTA_BITWISE_SREG={0x8}, @NFTA_BITWISE_MASK={0x380, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0xa5, 0x1, "878bd26fbcb51b9e4813d0bfca5d82f17f1035022cad14987b14d8ea0037f431e6d75ff0206fa52a0d3529200a86abd87679bf792eab787a7c9bf0d208b53ed87e78ca39710d57b4ddfff6df3f734b4f94501cb5e4ac58d164a0d4940a6a097b51a2f65c12c203cce8c3ae4d8cfd627c862c5277473431c10a93ffaebbbac4bfdc4bc28ce749f58bbc3d81c06d1d7888b8f956cf5337ab9088f804a73eb5359157"}, @NFTA_DATA_VALUE={0xa5, 0x1, "9ce0528612687b14502cbfda0ab8f1735922a074a2cc51f11ec6363f3594cc686b45c85809551c5b807d80f02315a6573cb9d54dd9d3c03c84ec06d0dae5c143ee5b47514fc0871412a07075c1adee0af10af5bb9057eb849685e579a49ef8f00e425bd1ed6028e79250f1f424ab3425e2815baff328ad954cd30a9a324e8c8459d1ea7afde572074ebb29dcfb85fa5e377a72cb985f0089b9e76fcbc3f4da0967"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x59, 0x1, "6ede61107c9fb69406f073b5314a2515d016ea1e58a4af3d0c3b734c0166d9fdb8ae71ff3eeff9f0d53a9d4a7e907e83f754a6fc87b17eb079e44671f4e4b558c40f31a501b43a798c5aad72e35256c35bfb018b3b"}, @NFTA_DATA_VALUE={0x89, 0x1, "35c0b2f7fc8bf854a2053d7ab749c62b9ce27ee3bab2fa71fb5d402440a8b1cbd8e1b0de3e9d5e971a20835d2ce1e7c0cd03ffe3a327b3c1d62854e6495c23b0f9de923c512b63b929879e0147cba8007d506b0a5cb405a97907f74b7bba9422b4182e68869c5f46defe8da55df01dbc5249cafaf4022ed2e04630d0b78ba8c168aa80fd22"}, @NFTA_DATA_VALUE={0xc1, 0x1, "23f4bf36754e37453a12689e5fa380edfb85a8a312962337c4d058fc237f5bb56af03b21bf90630f47e8dc8fd604ab1b80ea5a6b309c7cef6098171edde885b5f0e7f139e2b2f787f07708286afd2def7b4a7470bdf642a43a4ca366625dd1b5ab11c878bfc2ce8a8348f8114d3b8f26953692a0e3c0be7888b88eb4e109dd0551311035f17a77b6d9d7bae08a4f3206738748eb09fff66b72ab50414f95ecb5c9a1b5731797e66f96e7a1cc67a6f4ffc8c23947df6c7bf7f353729be1"}]}, @NFTA_BITWISE_MASK={0x2ac, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x31, 0x1, "6ff299f85f1c6a69b211715886a68866dc32869a9d1c9da3b774696f8eecefa40a886617b9e34ee94c4b650da1"}, @NFTA_DATA_VALUE={0x49, 0x1, "a1f41edba8969e7cf8026b82b9c61c8c54fa9c0fcb664f9123d5771fd88b035dc30ad7a6cf7ce057963a43b88498daf32e720be00f3cdab51ea5026a5e0312b88b5cfe0a52"}, @NFTA_DATA_VALUE={0x49, 0x1, "08e3e2d2c38e1d6ba86dd385657e1d1e1af68eb9b09fc75f91ad11033b02c7344375ad804cad18e1d021e79d24de0722ff8d173dae4457e05ba870f9aaddd02d67cbc11c7d"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0xf1, 0x1, "47482428e46a29b584d793a76f26c4959f35d9d4b430ddad53d669603a604e2de4dbc25d4654834d4b206c2b8d03a1a3869a161030d00c18690d84ad79c1c879c79d883d7bfe58907c0f355397e572efa42a554168b7cbe39ffd2e312b2581040b550f85923af131f886fec0e018ca76d880d4cffcfdcc8e23801999049831e358e85b1389b3146308a601b2de3dbcf86487018fe683dda11ebb0bcba09186bd79990fa7ac246f03a343343a00d2203067f40936b79d540390b14aad6bc7e4b1d591c2592f2fb24b8c44ede90b75e84b44b347d26e12f7f1edc0e527dceefdf23ca8e3b368c7fa75c3c12502e0"}, @NFTA_DATA_VALUE={0x8d, 0x1, "e8866f722615d006b14bd4695c7056e7e7e99d76bbfcbc6153f6bfc0e5cf51262979157a5fa6fe4e4a8046e1a51fee68e0473b78c9b653cdd5d3e5b18f7c79c77726e80af664e206dbc174a46e0a2c8e16d8f20953f8d6897ba0cd34645aa9e3e2dffbc27c2c27f264c38a7f6b4fc095bff37929246a4685940e5dab1ba127f2b23d06a361bfe576a3"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}]}}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0xc, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @void}}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_USERDATA={0x31, 0x6, 0x1, 0x0, "1676d5f0d9bb65c572256444fb08f380f559827bc759a786c6fd28ca14830b380cac39016840940db3f4e5b96d"}]}, {0x588, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x2d, 0x6, 0x1, 0x0, "f5673e2423268ba7ebcf502f311f874d46ebc53f4a178c5be4dbe5654c4143ac14f9c0c7f70fb349af"}, @NFTA_SET_ELEM_KEY_END={0x100, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x85, 0x1, "3614b0cda0925daa69dd95fe73a29f8cc82631726cf3255e4f2430a0398f0904f0675afd4d989e67068a0f859534a9fce712819b8a3bcfb84d3d52328598451980c08f948050cec0314e4be1542fa65d58cd7bd921d13ec6f5cbb9828d909c05a7eacafdeabb01fefaeb45eaff424263d7566bd146586160ac9d1fa9873607345b"}]}, @NFTA_SET_ELEM_KEY_END={0x90, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x9, 0x1, "f14b9bb8f1"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x35c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xc5, 0x1, "ae171e8ce97f6d96b2c4bc31bc498dc1130b060648ca03fae2ee8368bba7bf0f9944d6280807dd1af6643aacdcb51adbf3328d90dafc2a974b5e76fa5e769d24d87cfd4fb69d30684b99c0f78823e8ee6d29c7ac46f1c9897171b55a35b65de4fd806029e5437d1a54df0e0ba1e3b2015898fc9e732be702de4dd59b7afa7ac33d742e3ee59ec3f581a85407e90c545352642c6e46705fb17c90478a37364d6549065e834a46f3c6e3d6dd8ae8860e647feea416d566a4a84dd78085cee60a0f06"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xa1, 0x1, "a833f2b24b06232ae8c91003367b89a8fffd7ad8af4aa72d94d96efc129bd8ebeac9d5b35baa22b8bff521318373ee7d4bb36f043ebf11132ece28131d7c92f8adbabe348b7d7d3fbe4de69368fed603f104cb01f5cd346e68feea22e6f0b0a76e60683ec69484e33412bc4e36e54612f4f3db9d4b59cee1394d35db8700a00a97e80af91c89d5142cc7bb2c9bcdebcbb11909a38acff4506c0b4e397a"}, @NFTA_DATA_VALUE={0x75, 0x1, "810a48152150971c95ca470361cc5222524d0460694da3c4a005dd858388a9129eedd49315f21531d9bafe093e0e1ad856237c4e93f512f9875abd1755d24dc53e2eb1f5bcf3e4b356176bfcb9479620c16ca4fb2dc9d7748dfea7c79384751d72265fde49149d730bf973775699ba266f"}, @NFTA_DATA_VALUE={0xcd, 0x1, "44a48bc339e4a934b6e76ff9cb34415d888ab4462d4513e061fa374cc5226a55c4da1cde87a96aca57aa53a60e2abd49b8d3c501b79f26162cb645be93fac214b03ade62ad8c989dccd9336829737936503eae686ed50e4ccee1be4c166fad1fb0aab438014c627d336c64ef12e4f3a68d8a8a057fbdbdd8ba925eb988ce38a1d43396b413eb920e38b0f82c1ae87d50b884bbf03477d9bbb725ca3b2b8a4e225a22008c639e80c84863d607727c419d559322b4f0f5ac5fe55cb6fee1835aa06745fb08988c4a0b7d"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x64, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4d, 0x1, "53b5de28a049756d97071ff6a78c14e9bc3c8d665679f7c5c62e49eb9d67efd73767b9e8b54b37b6b7d27d2b4079555d6d4e8eea7e891cba87be9e6e7e5d4a22e5745ef159ef7b1c93"}, @NFTA_DATA_VALUE={0xd, 0x1, "b559191bc5c0645462"}]}]}]}]}, 0xe84}}, 0x0) 06:31:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x24, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000048400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 933.690947] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. 06:31:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8955, &(0x7f0000000040)) 06:31:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0, 0x40}, 0x1, 0x0, 0x0, 0x48005}, 0x10) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000004c400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x10, 0x201}, 0x14}}, 0x0) [ 933.768062] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. 06:31:40 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046210, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x17, &(0x7f00000001c0)="8f3987f1", 0x4) 06:31:40 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0}) [ 933.818001] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 06:31:40 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc00c620f, 0x0) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000068400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 4: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, 0x0) 06:31:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x25, 0x201}, 0x14}}, 0x0) 06:31:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@gettaction={0x20, 0x32, 0x0, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}, 0x3d}, 0x0) 06:31:40 executing program 1: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000006c400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x7f, 0x4) 06:31:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="54000000280083"], 0x54}}, 0x0) 06:31:40 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4020940d, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x0, 0x0, 0x0}) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000074400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:31:40 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5452, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000140)=0xfffffffd, 0x4) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000007a400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000140)=0x800, 0x4) 06:31:40 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff21e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='flush']) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) [ 934.105124] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 06:31:40 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r2, 0xfca7f765973fab03}, 0x14}}, 0x0) 06:31:40 executing program 4: select(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2710}) 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000140), 0x4) 06:31:40 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x400c620e, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000382400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000140), 0x4) 06:31:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 06:31:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@delqdisc={0x24, 0x25, 0x925, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 06:31:40 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000385400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4020940d, 0x0) 06:31:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0xc0189436, 0x0) 06:31:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x18, 0x31, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 06:31:41 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046208, 0x0) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000386400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf251c00000008000300", @ANYRES32=r2, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="0800246ec92a9322030059b5fb1df8fb285a7f7ee8a672ae80d2f8f6010e9a2c30ac9766c06191e01ec64ad4a4f03d9f4df4f1", @ANYRES32=r3, @ANYBLOB="0c000600020000000100000008000300", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x48005}, 0x10) 06:31:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0x1, &(0x7f0000000080)=@raw=[@kfunc], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:31:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x84000) 06:31:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x1, &(0x7f0000000080)=@raw=[@kfunc], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:31:41 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000387400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x31, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:41 executing program 0: syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0xffffffffffffffff, r0) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x7, 0x4) 06:31:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000140)=0x4, 0x4) 06:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x2e, 0x201}, 0x14}}, 0x0) 06:31:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8940, &(0x7f0000000040)) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000388400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5421, &(0x7f0000000040)) 06:31:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@gettaction={0x34, 0x32, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x20, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}]}]}, 0x34}}, 0x0) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000140), 0x4) 06:31:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5421, 0x0) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000389400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000001e00)=@newtaction={0x58, 0x30, 0x1, 0x0, 0x0, {}, [{0x44, 0x1, [@m_xt={0x40, 0x1, 0x0, 0x0, {{0x7}, {0x4}, {0x15, 0x6, "cc088aa2e65214fb7d40016cf0720c1f3f"}, {0xc}, {0xc}}}]}]}, 0x58}}, 0x0) 06:31:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x32, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000003200015c64b980c9d7b2fc000000000014000100100001"], 0x28}}, 0x0) [ 934.723869] tc_dump_action: action bad kind 06:31:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x24, 0x201}, 0x14}}, 0x0) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000038a400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000040)=[@register_looper], 0x1, 0x0, &(0x7f0000000180)='b'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\fc'], 0x1, 0x0, &(0x7f00000000c0)="d6"}) 06:31:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8902, &(0x7f0000000040)) 06:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x201, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 06:31:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x8300, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x201}, 0x14}}, 0x0) 06:31:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80108906, 0x0) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000038b400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x891c, &(0x7f0000000040)) 06:31:41 executing program 1: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "57590f5a074a0055ea753e95ee4aa9e8d06b1195b70ece34819823eda7944c21a4d6dd34eca3cb203d800b5404102f9e0104a192ec7434e33c9a2e4f647432"}, 0x60) 06:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000001e00)=@newtaction={0x44, 0x30, 0x1, 0x0, 0x0, {}, [{0x30, 0x1, [@m_xt={0x2c, 0x1, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000ffffff8c400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) [ 934.912108] tc_dump_action: action bad kind [ 934.931056] tc_dump_action: action bad kind 06:31:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@gettaction={0x24, 0x32, 0xe47b54a66fef7f77, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x24}}, 0x0) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8941, &(0x7f0000000040)) 06:31:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x541b) 06:31:41 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff21e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='flush']) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) 06:31:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000019040)=0x4) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, &(0x7f00000016c0)=""/151, &(0x7f00000001c0)=0x97) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000400)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000001680)=0x40) [ 935.025877] tc_dump_action: action bad kind 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000002693400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x18, 0x12, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 06:31:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@gettaction={0x20, 0x1c, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 06:31:41 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8983, 0x0) 06:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x2c, 0x201}, 0x14}}, 0x0) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000002694400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) 06:31:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8918, &(0x7f0000000040)) 06:31:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newtfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) 06:31:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000250025090000a997ee9d75a31e"], 0x24}}, 0x0) 06:31:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4b49, 0x0) 06:31:41 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000000000269d400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:41 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000240)) 06:31:42 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000380)=[@decrefs={0x630b}], 0x0, 0x0, 0x0}) 06:31:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$FUSE(r3, &(0x7f0000000080)={0x2020}, 0x2020) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="5800000024000b0e00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000002800020000000000020000000000000000000000fdffffff000000000c000400eb9b23fa"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="050450035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 06:31:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x21, 0x201}, 0x14}}, 0x0) 06:31:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000000026ab400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000000)=0xffffffff, 0x4) 06:31:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x30, 0x201}, 0x14}}, 0x0) 06:31:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x10, 0x32, 0x201}, 0x14}}, 0x0) 06:31:42 executing program 4: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 06:31:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5452, &(0x7f0000000040)) 06:31:42 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, 0x0) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000000003c2400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000140), 0x4) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="b2", 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0xc0189436, &(0x7f0000000040)) 06:31:42 executing program 1: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x2e) 06:31:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8903, &(0x7f0000000040)) 06:31:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 06:31:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="b2", 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x2, &(0x7f0000000040)) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000000003e6400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="98000000320001"], 0x98}}, 0x0) 06:31:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x30, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x2a, 0x201}, 0x14}}, 0x0) 06:31:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x73}, 0x14}}, 0x0) 06:31:42 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000012c0)={0x4c, 0x0, &(0x7f0000000240)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000fffffff5400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x6, 0x2}, 0x10}}, 0x0) 06:31:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001000010200000000b87d0493ab14f72b2d"], 0x20}}, 0x0) 06:31:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="b2", 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8902, &(0x7f0000000040)) 06:31:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$nfc_llcp(r0, &(0x7f0000002780)=[{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002580)='\v', 0x1}, {&(0x7f0000002600)="9d", 0x1}], 0x2, &(0x7f0000002700)={0x10}, 0x10}], 0x1, 0x0) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000fffffff6400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@gettaction={0x20, 0x11, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x3f, 0x4) 06:31:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0xffffffff, 0x4) 06:31:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x25, &(0x7f0000000140), 0x4) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000fffffffb400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, 0x15, 0xa, 0x5}, 0x14}}, 0x0) 06:31:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8915, &(0x7f0000000040)) 06:31:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0x1, &(0x7f0000000080)=@raw=[@kfunc], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5460, 0x0) 06:31:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x10, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:42 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000fffffdfc400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0x1, &(0x7f0000000080)=@raw=[@kfunc], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:31:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000240), 0x4) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000fffffdfd400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 5: bpf$OBJ_GET_PROG(0x7, 0xffffffffffffffff, 0x0) 06:31:42 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x29, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000000001fe400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80108907, 0x0) 06:31:42 executing program 4: r0 = socket(0xa, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}) 06:31:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@delchain={0x4c, 0x65, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0x8}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_PORT_DST_MIN={0x6}]}}, @TCA_CHAIN={0x2}, @TCA_RATE={0x6}]}, 0x4c}}, 0x0) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000fffffffe400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000500)=""/4, &(0x7f0000000600)=0x4) 06:31:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f00000000c0)="d4", 0x1) 06:31:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@gettaction={0x20, 0x21, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8934, 0x0) [ 936.146944] net_ratelimit: 2 callbacks suppressed [ 936.146954] ip6tnl0: mtu greater than device maximum 06:31:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8941, 0x0) 06:31:42 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000240)={0x1f, 0x0, 0x1}, 0x6) 06:31:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x12, 0x201}, 0x14}}, 0x0) 06:31:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="b2", 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8901, &(0x7f0000000040)) 06:31:42 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000fff400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x5d) 06:31:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x890b, 0x0) 06:31:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x3) 06:31:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4020940d, &(0x7f0000000040)) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000001fffff400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8981, 0x0) 06:31:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$nfc_llcp(r0, &(0x7f0000002780)=[{0x0, 0x0, &(0x7f00000026c0)=[{0x0}, {&(0x7f0000002600)="9d", 0x1}], 0x2, &(0x7f0000002700)={0x28, 0x0, 0x0, "1a028898bd8920fb115c07d2d3d81684b2"}, 0x28}], 0x1, 0x0) 06:31:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x1e, 0x201}, 0x14}}, 0x0) 06:31:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000200000001000000007fffffff400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000380)=[@decrefs], 0x2, 0x0, 0x0}) 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8919, &(0x7f0000000040)) 06:31:43 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 06:31:43 executing program 5: socketpair(0x2, 0x5, 0x0, &(0x7f0000000240)) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000ffffffff400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x890c, 0x0) 06:31:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40086602, 0x0) 06:31:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000003040)={0x0, 0x0, 0x0, 0x20003008}, 0x0) 06:31:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8954, &(0x7f0000000040)) 06:31:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8953, &(0x7f0000000040)) 06:31:43 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4018620d, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010007ffffffffffff400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x89a1, &(0x7f0000000040)) 06:31:43 executing program 0: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000340)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) 06:31:43 executing program 4: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bind$nfc_llcp(r0, 0x0, 0x0) 06:31:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x0, 0x0, 0x0, 0x135, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x48) 06:31:43 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x4, 0x0, &(0x7f0000000040)=[@register_looper], 0x0, 0x0, 0x0}) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000017fffffffffffffff400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff21e66174000404090a0200027400f8", 0x16}, {&(0x7f00000013c0)="eaffffff2dd5d204", 0x8, 0x1f}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 06:31:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x18, 0x30, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 06:31:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x890d, 0x0) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000004000000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000140)=0x1000000, 0x4) 06:31:43 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 06:31:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x2a, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000010000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x1c, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newchain={0x24, 0x64, 0x1}, 0x24}}, 0x0) 06:31:43 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x44, 0x0, &(0x7f0000000500)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000005c0)="cc"}) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000020000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000380)=[@decrefs={0x40046305}], 0x0, 0x0, 0x0}) 06:31:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x12, 0x3, &(0x7f0000000480)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:31:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8901, 0x0) 06:31:43 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000240)) 06:31:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x1c, 0x201}, 0x14}}, 0x0) 06:31:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8902, 0x0) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000080000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x32, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x2, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x28, 0x32, 0x201, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x5, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 06:31:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@remote, @in=@loopback}]}, 0x38}}, 0x0) 06:31:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, &(0x7f00000016c0)=""/151, &(0x7f00000001c0)=0x97) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000090000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0}) 06:31:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x89a0, &(0x7f0000000040)) 06:31:43 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000000000001f0000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80087601, 0x0) 06:31:43 executing program 1: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder0\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder1\x00', 0x0, 0x0) 06:31:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$nfc_llcp(r0, &(0x7f0000002780)=[{&(0x7f0000002500)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "27fbd6812f7c89108b8cff931ef6ef1b70fe6d9a80c53a4d99d6b52cb109a7e9721afe257e4da90f2e270a91b99ef272a2b219bf60abdea29e15a7b7c1ad0a"}, 0x60, &(0x7f00000026c0)=[{&(0x7f0000002580)='\v', 0x1}], 0x1, &(0x7f0000002700)={0x10}, 0x10}], 0x1, 0x0) [ 937.246068] tc_dump_action: action bad kind [ 937.261643] nla_parse: 7 callbacks suppressed [ 937.261652] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 06:31:44 executing program 5: select(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x80000001}, &(0x7f0000000180)={0x0, 0x2710}) 06:31:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1c, 0x1, &(0x7f0000000080)=@raw=[@kfunc], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 06:31:44 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000000c0)="d6"}) 06:31:44 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620b, 0x0) 06:31:44 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$nfc_llcp(r0, 0x0, 0x0, 0x0) 06:31:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000370000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1d, 0x0, &(0x7f0000000080)) 06:31:44 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000380)=[@decrefs={0x40046313}], 0x0, 0x0, 0x0}) 06:31:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80086601, 0x0) 06:31:44 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000040)=[@register_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\fc'], 0x0, 0x0, 0x0}) 06:31:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1d, &(0x7f0000000140), 0x4) 06:31:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000020000000100000000000000003f0000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4b47, 0x0) 06:31:44 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)) 06:31:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="b2", 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5411, &(0x7f0000000040)) 06:31:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010002000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:44 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc00c620f, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:31:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="7c000000320001020087e10000000000090000000c00020001000000010001"], 0x7c}}, 0x0) 06:31:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000010"], 0x37fe0}}, 0x0) 06:31:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="b2", 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8904, &(0x7f0000000040)) 06:31:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40049409, 0x0) 06:31:44 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0xfffffdd2) 06:31:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010003000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x12, 0x10, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 06:31:44 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="b00000000000006b2e7fb3f37325da31441db48ce366a233a65b0ff573"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x0) 06:31:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x40086602) 06:31:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x40087602, 0x0) 06:31:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f0000003080)={0x18, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}, 0x18}, 0x300}, 0x0) 06:31:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010004000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:44 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x50, 0x0, &(0x7f0000000380)=[@decrefs, @enter_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000480)="7d92a1b4"}) 06:31:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0, 0x40}}, 0x0) 06:31:44 executing program 1: socketpair(0xa, 0x2, 0x1, &(0x7f0000000380)) 06:31:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010005000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:44 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="b80000002100000227bd7000fbdbdf250a8080c1050000000800010008000e00e4b3c41c08000e0080000000140001002001000000000000000000000000000114000200fc0000000000000000000000000000ff14"], 0xb8}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 937.903209] ------------[ cut here ]------------ [ 937.941628] WARNING: CPU: 0 PID: 5981 at fs/inode.c:343 inc_nlink.cold+0x11/0x18 [ 937.949182] Kernel panic - not syncing: panic_on_warn set ... [ 937.949182] [ 937.956555] CPU: 0 PID: 5981 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 937.964353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.973713] Call Trace: [ 937.976312] dump_stack+0x1fc/0x2ef [ 937.979953] panic+0x26a/0x50e [ 937.983155] ? __warn_printk+0xf3/0xf3 [ 937.987059] ? inc_nlink.cold+0x11/0x18 06:31:44 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010006000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}]}) 06:31:44 executing program 0: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom1\x00', 0x3ffec2a33a095bd6, 0x0) [ 937.991045] ? __probe_kernel_read+0x130/0x1b0 [ 937.995636] ? __warn.cold+0x5/0x5a [ 937.999271] ? inc_nlink.cold+0x11/0x18 [ 938.003249] __warn.cold+0x20/0x5a [ 938.006794] ? io_schedule_timeout+0x140/0x140 [ 938.011380] ? inc_nlink.cold+0x11/0x18 [ 938.015358] report_bug+0x262/0x2b0 [ 938.018991] do_error_trap+0x1d7/0x310 [ 938.022883] ? math_error+0x310/0x310 [ 938.026693] ? __irq_work_queue_local+0x101/0x160 [ 938.031539] ? irq_work_queue+0x29/0x80 [ 938.035516] ? error_entry+0x72/0xd0 [ 938.039239] ? trace_hardirqs_off_caller+0x6e/0x210 [ 938.044263] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 938.049115] invalid_op+0x14/0x20 [ 938.052572] RIP: 0010:inc_nlink.cold+0x11/0x18 [ 938.057156] Code: c0 74 04 3c 03 7e 08 8b 5d 48 e9 e7 68 b4 f9 4c 89 e7 e8 aa 99 a3 f9 eb ee e8 43 bd 6d f9 48 c7 c7 80 b0 74 88 e8 a2 ee fe ff <0f> 0b e9 29 6a b4 f9 e8 2b bd 6d f9 48 8d 7b 40 b8 ff ff 37 00 48 [ 938.076059] RSP: 0018:ffff8880a1c4fce8 EFLAGS: 00010282 [ 938.081431] RAX: 0000000000000024 RBX: ffff88808dc039c0 RCX: 0000000000000000 [ 938.088707] RDX: 000000000000cd0a RSI: ffffffff814dff01 RDI: ffffed1014389f8f [ 938.095979] RBP: 0000000000000000 R08: 0000000000000024 R09: 0000000000000000 [ 938.103354] R10: 0000000000000005 R11: 0000000000000000 R12: ffff88808dc03a08 [ 938.110898] R13: ffff88808de10ca0 R14: ffff88809bb61f80 R15: ffff8880a17b1140 [ 938.118172] ? vprintk_func+0x81/0x180 [ 938.122047] ? inc_nlink.cold+0x11/0x18 [ 938.126011] v9fs_vfs_mkdir_dotl+0x4eb/0x610 [ 938.130424] ? v9fs_vfs_create_dotl+0x30/0x30 [ 938.134905] ? cap_task_prctl+0x750/0xd30 [ 938.139040] ? capable_wrt_inode_uidgid+0x1d2/0x220 [ 938.144040] ? generic_permission+0x116/0x4d0 [ 938.148521] ? inode_permission.part.0+0x10c/0x450 [ 938.153435] vfs_mkdir+0x508/0x7a0 [ 938.156970] do_mkdirat+0x262/0x2d0 [ 938.160596] ? __ia32_sys_mknod+0x120/0x120 [ 938.164908] ? trace_hardirqs_off_caller+0x6e/0x210 [ 938.169921] ? do_syscall_64+0x21/0x620 [ 938.173879] do_syscall_64+0xf9/0x620 [ 938.177677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.182849] RIP: 0033:0x7f8f72781049 [ 938.186543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 938.205432] RSP: 002b:00007f8f710f6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 938.213134] RAX: ffffffffffffffda RBX: 00007f8f72893f60 RCX: 00007f8f72781049 [ 938.220396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200002c0 [ 938.227655] RBP: 00007f8f727db08d R08: 0000000000000000 R09: 0000000000000000 [ 938.235231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 938.242485] R13: 00007ffdd3c8693f R14: 00007f8f710f6300 R15: 0000000000022000 [ 938.250164] Kernel Offset: disabled [ 938.253932] Rebooting in 86400 seconds..